0+
attendees
0+
speakers
0+
exhibitors
0th
Summit
  • Connector.

    WHAT

    The grandEST ICT security event and meeting of minds for the Nordic-Baltic region that is celebrating its 10th anniversary. Check the 9th Summit overview video and summaries here.

  • Connector.

    WHEN

    4 April 2019 – save the date and leave your contacts on the below form so we could send you the invitation and let you know when the registration and Early Bird fees are available.

  • Connector.

    WHY

    • Learn about the very latest ICT security news from leadership, public sector and technology perspectives
    • Meet Baltic and Scandinavian security vendors and clients
    • Accelerate innovation by connecting with ICT security start-ups
    • Unveil your expertise and mingle with other talents

  • Connector.

    WHERE

    Estonia, the tech savvy state in North Europe situated on the frontier of NATO, birthplace of Skype, HQ of the NATO Cooperative Cyber Defence Centre of Excellence, sentinel of EU cyber defence.

Registration

Participation terms
The Early Bird entrance fee, EUR 290 (excl. VAT), is available until 31 October 2018. Entrance fee from 1 November 2018 is 390 (excl. VAT). Conference fee grants access to the conference day and evening reception. For invited guests who will receive a unique invitation code in their letter of invitation, participation is free of charge.

Registration
Please register for the conference by 29 March 2019 using the registration form. Upon successful registration, you will receive a confirmation letter. If you do not receive a confirmation letter, please contact margot@confent.com.

Cancellation
Participation fee will be fully reimbursed if notified in written before March 29. Attention invitational guests: if you have registered for the event but cannot attend, please make sure to notify margot@confent.com by March 29. We expect more interest than we can accommodate, so it is very important that you free your seat to others in case you cannot attend.

Information
Please contact margot@confent.com with any information request you might have regarding the conference and reception.

Data
Read about how we process and protect the data you provide.

Data. The data you provide on the 2019 contact and registering form will be used in good faith to invite you to this and future conferences, also to keep you up to date with the event (emails with updates). Your name, surname and organisation name will be used on the name tag that you will recieve while registering. Your contact number is important in case we need to get in touch with you to give some urgent info (e.g force majeure), we also sometimes use calling if interested parties who have visited the event previously have not registered to upcoming event. Your data and organisation address is needed for billing, we also might send you paper invitation for the next event. We analyse attendees data to see how many participants and from which country were present/not present, also which field and occupation representatives were present.

Security. The data you provide on registering will be securely hold and seen only by event organising team that consists of members from Security Software OÜ and Confent OÜ. The attendance list in the format of name, surname and organisation name, will be provided to event partners upon their request for informational purpose (2019 event partners TBC). We do not provide your phone number, email or organisation address to event partners or other third party that is not named on the above list.

Right to be forgotten. We assure that we keep your data securely and use only in the above mentioned ways. Please note that if you decide that your data should be forgotten or deleted from our database you do not recieve any more invitations (including free invitations) to conferences, seminars or forums Security Software OÜ or Confent OÜ organises. We are sorry to see you go but here is the link for you to let us know of your decision.

.readmore


Email address*

Telephone number (preferably mobile) incl. country code*

Job title/Position*

Organisation*

Address of organisation*

Post code, city and country*

Invitation code

Invitation code

I will also attend the evening reception on April 4th


Which streams would interest you the most?

Speakers

  • Connector.Connector.

    How to protect critical infrastructure?

    MARINA KALJURAND

    Chair of the Global Commission on the Stability of Cyberspace

  • Connector.Connector.

    CRYPTO CURRENCY AND IT SECURITY

    PEETER KOPPEL

    Private banking strategist at SEB Pank AS

  • Connector.Connector.

    RALPH ECHEMENDIA

    The Ethical Hacker and CEO of Seguru

  • Connector.Connector.

    2007 and 2017 incidents - have we learned to respond better?

    MERIKE KÄO

    CTO at Farsight Security, Inc.

Program

Klick on the presentations to learn more about the speaker and topic.

09.30Registration and Morning Coffee
10.00Welcoming Address
Rita Käit-Vares, Board Member and Partner at Security Software
Louis Zezeran, Professional Host and Entrepreneur

 

 

RITA KÄIT-VARES
Board Member and Partner at Security Software

 

 


LOUIS ZEZERAN
Professional Host and Entrepreneur

 

.mod-modal
10.15How to Protect Critical Infrastructure?
Marina Kaljurand, Chair of the Global Commission on the Stability of Cyberspace

HOW TO PROTECT CRITICAL INFRASTRUCTURE?

MARINA KALJURAND
Chair of the Global Commission on the Stability of Cyberspace

The cyber revolution has come to stay. ICTs continue to provide immense opportunities for social and economic development. However, the wider use of ICTs is accompanied by new challenges and negative trends. Cyber security has become an integral part of security; however, it is one that States cannot effectively manage alone. International cooperation and multi-stakeholder approach are very important in securing a state where all stakeholders are free to enjoy the benefits of cyberspace. Recent cyberincidents/cyberattacks have exposed vulnerability of critical infrastructure. As with all critical infrastructures, the technology that underpins the global internet is imperfect. Therefore it is crucial to recognizing the global reliance on cyberspace, the increasing dependence of other infrastructures on its reliability and the potentially dramatic consequences of its disruption. As the Chair of the Global Commission on the Stability of Cyberspace, Marina introduces a norm that was launched in November 2017 — the Call to Protect the Public Core of the Internet. It is an appeal for a new global norm to apply to both state and non-state actors to refrain from activity that intentionally and substantially damages the general accessibility or integrity of the Internet itself.


Marina began her career at the Ministry of Foreign Affairs in 1991 and held several leadership positions, including Undersecretary for Legal and Consular Affairs (Legal Adviser), Undersecretary for Trade and Development Cooperation, Undersecretary for Political Affairs. She served as Ambassador of Estonia to the State of Israel, the Russian Federation, Kazakhstan, Mexico, Canada and the United States of America. Kaljurand was a member of Estonian Governmental delegation in negotiations with Russia Federation on withdrawal of Russian troops from Estonia and Border Agreements between Estonia and Russia. Kaljurand headed the legal working group at the Estonian accession negotiations to the European Union and was the Chief Negotiator in Estonian accession negotiations to the OECD.

Marina has served twice as the Estonian National Expert at the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (GGE), in 2014-2015 and in 2016-2017.

Marina Kaljurand served as Estonian Foreign Minister from 2015 July – 2016 October. Starting from March 1 2017 Marina Kaljurand is the Chair of the Global Commission on the Stability of Cyberspace (GCSC).

Marina Kaljurand graduated cum laude from the Tartu University (1986, LLM). She has a professional diploma from the Estonian School of Diplomacy (1992) and MA from the Fletcher School of Law and Diplomacy, Tufts University (F95).

.kaljurand-modal
10.502007 and 2017 Incidents – Have We Learned to Respond Better?
Merike Käo, CTO at Farsight Security, Inc.

2007 AND 2017 INCIDENTS – HAVE WE LEARNED TO RESPOND BETTER?

MERIKE KÄO
CTO at Farsight Security, Inc.

In the last decade there have been several highly impactful vulnerabilities exposed that affected the fundamental building blocks that electronic communications rely on. There have also been several destructive attacks and breaches on critical infrastructures. What are the lessons learned in the last decade in handling responsible vulnerability disclosure and incident handling? Merike will share her observations on Estonia’s incident response to the 2007 events and a decade later the incident response to the recent 2017 Estonian ID card vulnerability. It will also highlight practical considerations for incident response to globally impacting protocol and hardware vulnerabilities such as Heartbleed and Meltdown/Spectre.


Merike Käo is the CTO of Farsight Security, responsible for developing the technical strategy and executing its vision. Prior to joining Farsight Security, Merike held positions as CISO for Internet Identity (IID), and founder of Doubleshot Security, which provided strategic and operational guidance to secure Fortune 100 companies. She led the first security initiative for Cisco Systems in the mid 1990s and authored the first Cisco book on security—translated into more than eight languages and leveraged for prominent security accreditation programs such as CISSP. In 2007 Merike was instrumental in fostering cooperation and trust among the global NSP-Sec liaisons during the Cyber attacks against Estonia.

Merike is a member of the IEEE, a pioneer member of ISOC and has been an active contributor in the IETF since 1992. She is deeply rooted in many global Internet communities having supporting organizations such as NANOG, APNIC, RIPE, ICANN, IGF, ISOC and Interop. She is on ICANN’s Security and Stability Advisory Council (SSAC) and the FCC’s Communications Security, Reliability and Interoperability Council (CSRIC) and in 2016 was appointed to the ARIN Board of Trustees to serve a one year term from Jan 1, 2017 to Dec 31, 2017. Merike earned a MSEE from George Washington University and a BSEE from Rutgers University..

.kao-modal
11.30Networking Break with Partner Presentation
11.35One Identity Fall Update
Martin Scherrer, Business Development Manager at One Identity

ONE IDENTITY FALL UPDATE

MARTIN SCHERRER
Business Development Manager at One Identity

– Who is One Identity?
– Get Identity and Access Management Right
– Focus Area
– The Scope


Martin has a very international background – he was a CEO of an ITSM Company in Switzerland for a 4 years, has experience in sales in IT since 2007 and has been Global Account Director for Global Companies over 4 years and last two years he has worked as a Business Development Manager for CEE, GCC & Nord Africa.

.scherrer-modal
INFORMATION SECURITY PERSPECTIVE
12.00Threat brief: DDoS, Credential Reuse, IoT Botnets, Bitcoin Mining malware, Spectre, Meltdown
Larry Cashdollar, Senior Security Response Engineer at Akamai Technologies

THREAT BRIEF: DDOS, CREDENTIAL REUSE, IOT BOTNETS, BITCOIN MINING MALWARE, SPECTRE, MELTDOWN

LARRY CASHDOLLAR
Senior Security Response Engineer at Akamai Technologies

Larry will discuss the current threat landscape using Akamai’s unique position as a global leader in content delivery and web security. His talk will discuss current trends in attacks observed against various industry verticals ranging from DDoS, Credential Reuse, IoT Botnets, Bitcoin Mining malware, and vulnerabilities impacting the information security industry like Spectre and Meltdown.


Larry W. Cashdollar has been working in the security field as a vulnerability researcher for over 18 years, and is currently a member of the Security Incident Response Team at Akamai Technologies. He studied computer science at the University of Southern Maine. Larry has documented over 150 CVEs and has even presented his research at BSides Boston, OWASP Rhode Island, and Defcon. He enjoys the outdoors and rebuilding mini-bike engines in his spare time.

.cashdollar-modal
12.30People Centric Security – the New Paradigm in Cybersecurity
David Karlsson, Nordic & Baltics region Sales Engineer at Proofpoint

PEOPLE CENTRIC SECURITY – THE NEW PARADIGM IN CYBERSECURITY

DAVID KARLSSON

Nordic & Baltics region Sales Engineer at Proofpoint

Cybercriminals are increasingly targeting the human vulnerability. With businesses moving towards O365, Proofpoint will bring a more deterministic way of building resilience into the ecosystem that protects your employees & business from cyber threats. In this session, we will discuss how Proofpoint’s market leading technology is restoring trust to today‘s number one attack vector: email.


David has over 25 years of experience in the IT industry. Starting out in the Swedish Armed Forces working with supporting their infrastructure, he has since held positions Sales Engineering positions for IT-Security Distributors as well as the position of Certified Trainer for CyberSecurity Vendors. Currently David holds the position of Sales Engineer covering the Nordic’s and Baltics for Proofpoint.

.proofpointesineja-modal
13.00Cryptocurrency – It’s Not Even Real Money and Still They Want to Take it Away From You!
Peeter Koppel, Private Banking Strategist at SEB Pank

CRYPTOCURRENCY – IT’S NOT EVEN REAL MONEY AND STILL THEY WANT TO TAKE IT AWAY FROM YOU!

PEETER KOPPEL
Private Banking Strategist at SEB Pank

– Why did the history’s biggest financial bubble emerge?
– Who are hunting your virtual assets?


Peeter Koppel is SEB Pank’s private banking strategist. During two decades, he has worked in a number of financial market positions that have also included trading currencies and shares. Koppel also teaches the Executive MBA program at the Estonian Business School.

.koppel-modal
LAW AND POLICY PERSPECTIVE
12.00International Law Restrictions on Offensive Cyber Activity
Liis Vihul, CEO of Cyber Law International

INTERNATIONAL LAW RESTRICTIONS ON OFFENSIVE CYBER ACTIVITY

LIIS VIHUL
Chief Executive Officer of Cyber Law International

In her presentation, Liis will talk about the most critical legal questions concerning cyber crimes that target private and public sector organizations. For private sector, one of the most burning questions is if and how does the international law protect private sector companies from national cyber attacks like NotPetya. Also, what does the international law say about the right of the private sector to hack back in such cases.

For the public sector, one of the most critical questions is the efficiency of international law to prevent the cyber attacks. Today, the countries have agreed that the international law applies also for the cyber attacks but why is the number of the attacks still growing? What should the countries do differently to actually limit the attacks? What kind of attacks should the international law prevent?


Ms. Liis Vihul is also a member of the Estonian delegation at the United Nations Group of Governmental Experts on Information and Telecommunications in the Context of International Security, serves as the co-editor of the International Humanitarian Law Group in the Manual on International Law Applicable to Military Uses of Outer Space project, and is an Ambassador of the NATO Cooperative Cyber Defence Centre of Excellence.

Previously, she spent 9 years as a senior analyst in the Law and Policy Branch at the NATO Cooperative Cyber Defence Centre of Excellence and was the managing editor of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Ms. Vihul holds master’s degrees in law from the University of Tartu and in information security from the University of London.

.vihul-modal
12.30Responses Under International Law by States and Organizations to Hostile Cyber Operations
Michael N. Schmitt, Professor of International Law at the United States Naval War College

RESPONSES UNDER INTERNATIONAL LAW BY STATES AND ORGANIZATIONS TO HOSTILE CYBER OPERATIONS

MICHAEL N. SCHMITT
Professor of International Law at the United States Naval War College

Michael Schmitt is the Charles H. Stockton Professor at the U.S. Naval War College’s Stockton Center for the Study of International Law. He is also the Francis Lieber Distinguished Scholar at the United States Military Academy’s Lieber Institute, Professor of Public International Law at the University of Exeter, and Senior Fellow at the NATO Cooperative Cyber Defense Centre of Excellence. From 2013 to 2017 he was the director of The International Law of Cyber Conflict at NATO Cyber Defence Centre of Excellence.

.schmitt-modal
13.00Estonian Cyber Security Act – Ensuring Public Order In Cyber Domain
Elsa Neeme, Legal Expert of the Cyber Security Branch at the Information System Authority

ESTONIAN CYBER SECURITY ACT – ENSURING PUBLIC ORDER IN CYBER DOMAIN.

ELSA NEEME

Legal Expert of the Cyber Security Branch at the Information System Authority

Is there a need for a legal framework for network security? How to engage community and manage different stakeholders? How to get there with a minimal administrative burden?


Elsa Neeme works as a Legal Expert in the Cyber Security Branch of Estonia’s Information System Authority (RIA). She provides in-house legal advice and support to the execution of RIA’s tasks in cyber security, ranging from incident response to cooperation with private sector service providers. Elsa is also a member of Estonia’s Network and Information Systems Directive (EU) 2016/1148 transposition working group and one of the co-authors of Estonia’s draft Cyber Security Act.

.riaesineja2-modal
TECHNOLOGY PERSPECTIVE
12.00CERT-EE S4A: an Open-Source Solution for Distributed Network Security Monitoring
Andres Elliku, Cyber Security Expert at Information System Authority

CERT-EE S4A: AN OPEN-SOURCE SOLUTION FOR DISTRIBUTED NETWORK SECURITY MONITORING

ANDRES ELLIKU
Cyber Security Expert at Information System Authority

CERT-EE has many organizations in its constituency with various levels of matureness regarding to their own security operations. To provide support and to simplify ways of cooperation between CERT-EE and our partners we have set out to aggregate distributed sensor network data into a simplified pipeline. Out of it grew a modular open-source solution for distributed network security monitoring. We utilize open-source components that are tied together with a custom API in order to monitor, analyze and capture network traffic to detect possible abnormal behaviour and anomalies. Main reason for doing so is to enable seamless integration with partners and to build capability for easy adoption of new applications. The entire platform is contribution based. All partners can decide themself, how much are they willing or able to contribute towards the central. From the other side, the central component provides us with the capability to apply different rulesets for our partners. This enables us to tailor the rulesets according to the needs of our partners. From the development side, the modularity of the platform makes it easy to implement new components or swap out the old ones. For our partners this means that it will be much more simple and more cost effective to set up this complex stack of software.


Andres Elliku is responsible for incident response, threat hunting and infrastructure and toolkit development. His daily tasks include handling of cyber incidents, incident coordination, supporting institutions and internet service providers and giving out warnings of ongoing threats. Andres is also running CERT-EE’s malware analysis sandbox, S4A and various other toolsets. Occasionally Andres also does some client side red teaming and blue teaming. Before joining CERT-EE team, he worked in the public sector as a systems engineer and security advisor. Andres is currently obtaining a MsC in Cybersecurity from Tallinn Technical University. He is also an active member of the Estonian Defence League since 2015.

.esinejakinnitamisel12-modal
12.30Designing Proactive IT Security
Per Söderqvist, Team Leader Sales Engineer, Nordics & Baltics at Sophos

DESIGNING PROACTIVE IT SECURITY

PER SÖDERQVIST
Team Leader Sales Engineer, Nordics & Baltics at Sophos

– Identifying the weak spots using root cause analytics
– Stopping the threats early in the chain
– User education as the last line of defense
– Security as an “eco system”


Per works as Lead Sales Engineer at Sophos in Stockholm, Sweden. He is responsible for the development of IT security strategies for large corporations and their implementation at customers as well as partner enablement. Per has over 10 years of experience and extensive expertise in the IT security. He is an expert in the area of data encryption, endpoint and network security as well as gateway protection.

.soderqvist-modal
13.00A Real Life Case Study How a Service Provider for Healthcare Exposed All Customer Details
Wim Zandee, Director System Engineering North & East EMEA at F5 Networks

A REAL LIFE CASE STUDY HOW A SERVICE PROVIDER FOR HEALTHCARE EXPOSED ALL CUSTOMER DETAILS

WIM ZANDEE
Director System Engineering North & East EMEA at F5 Networks

In his presentation, Wim will share how a pen test helped to reveal the weaknesses in an organization and forced them to implement a new approach through security.

.zandee-modal
13.30 Networking Lunch with Partner Presentation
14.00Extending the Power of Email
Achim Brinkmann, Business Development Manager and International Sales at Cryptshare

EXTENDING THE POWER OF EMAIL

ACHIM BRINKMANN
Business Development Manager and International Sales at Cryptshare

– Keeping e-mails private
– Removing file size limits
– Bringing compliance


Achim Brinkmann earned a master’s degree studying Business Adminstration at the University of Saarland in Saarbruecken and at the University of Missouri in Columbia, Missouri. Achim Brinkmann has been involved in telecoms, software and IT security in business development and sales management roles for 20 years. He has been working with corporate clients in the DACH region, Scandinavia, Eastern Europe, North America and the Middle East.

.brinkmann-modal
INFORMATION SECURITY PERSPECTIVE
14.30How to Maintain Business Equally Secured in Corporate Network and Cloud
Harri Hämäläinen, Finland & Baltic countries Territory Manager at McAfee

HOW TO MAINTAIN BUSINESS EQUALLY SECURED IN CORPORATE NETWORK AND CLOUD

HARRI HÄMÄLÄINEN
Finland & Baltic countries Territory Manager at McAfee


– Adaptive Security Architecture – an innovative, real-time, bi-directional communications fabric that helps making smarter decision faster.
– CASB – Cloud Access Security Broker that enables organisations to accelerate their business by giving them control over their data in the cloud.

.mcafeeesineja-modal
15.00Lessons Learned from the 2017 Estonian ID-Card Case
Rain Ottis, Associate Professor at Tallinn University of Technology

LESSONS LEARNED FROM THE 2017 ESTONIAN ID-CARD CASE

Dr. RAIN OTTIS
Associate Professor at Tallinn University of Technology

Events that took place last year concerning the ID card illustrate Estonia’s critical dependence on information technology. In order to not waste a good crisis, a study will be carried out at the request of the Information System Agency of TUT, in which the lessons learned from the case will be mapped out. In this presentation, the first findings will be presented.


Dr. Rain Ottis is the head of Tallinn University of Technology’s Centre for Digital Forensics and Cyber Security and an Associate Professor at TUT. Earlier, he served as a scientist at the NATO Cooperative Cyber Defence Centre of Excellence and as a communications officer in the Estonian Defence Forces. He is a graduate of the United States Military Academy at the West Point (BS, Computer Science) and Tallinn University of Technology (PhD, Computer Science; MSc, Informatics).

.riaesineja-modal
15.30Cyber Defense Operations – Protecting Everything Against Unknown?
Ole Tom Seierstad, National Security Officer at Microsoft

CYBER DEFENSE OPERATIONS – PROTECTING EVERYTHING AGAINST UNKNOWN?

OLE TOM SEIERSTAD
National Security Officer at Microsoft

In his presentation, Ole will address the best practices regarding the use of Cyber Threat Intelligence and increasing Critical Information Infrastructure Resiliency based on Hybrid Cloud and Secure Government Worker environment implementation.


Ole Tom is Microsoft’s National Security Officer responsible for Public Safety, National Security and Defense topics.

.kosla-modal
LAW AND POLICY PERSPECTIVE
14.30Protection of Critical National Infrastructure from Cyber Attack (via Skype)
Kristan Stoddart, Reader at Aberystwyth University

PROTECTION OF CRITICAL NATIONAL INFRASTRUCTURE FROM CYBER ATTACK (via Skype)

KRISTAN STODDART
Reader at Aberystwyth University


.esinejakinnitamisel15-modal
15.00What are the Challenges of Handling Cyber Crime?
Oskar Gross, Head of the Cyber Crimes Bureau at the Central Criminal Police

WHAT ARE THE CHALLENGES OF HANDLING CYBER CRIME?

OSKAR GROSS
Head of the Cyber Crimes Bureau at the Police and Border Guard Board

Two of the most important components of cybercrime are internationalism and the service-based nature, which make it much more difficult to handle these types of crimes and require an international approach. Oskar Gross talks about contemporary cybercrime nuances and challenges.


From January 2016 Oskar Gross has been the head of Cybercrime Bureau at the Central Criminal Police. Before joining the Police he worked at the University of Helsinki where he obtained a PhD in computational linguistics and data analysis. Before moving to Helsinki he has been working in different companies focusing on software development and R&D.

.gross-modal
15.30GDPR Checklist – are you Ready for the Regulation Enforcement in May?
Juha Sallinen, Founder and CEO of GDPR Tech

GDPR CHECKLIST – ARE YOU READY FOR THE REGULATION ENFORCEMENT IN MAY?

JUHA SALLINEN
Founder and CEO of GDPR Tech


GDPR is about regulation. But it is also about security, processes and data management. And most of all – it is about awareness and people. In the presentation, we go thru practical examples from real projects.

.sallinen-modal
TECHNOLOGY PERSPECTIVE
14.30Stripping Threats out of Your Organization with Data Sanitization (CDR)
Boaz Litai, Regional Director EMEA at OPSWAT
Søren Elnegaard Petersen, Partner and Sales Manager at Arbit Security

STRIPPING THREATS OUT OF YOUR ORGANIZATION WITH DATA SANITIZATION (CDR)

BOAZ LITAI, Regional Director EMEA at OPSWAT

SØREN ELNEGAARD PETERSEN, Partner and Sales Manager at Arbit Security

In this presentation, Boaz and Søren will answer to the following questions:
– Who is OPSWAT
– State of Cyber Security Today
– What is Content Disarm & Reconstruction (CDR)
– How is CDR implemented
– OPSWAT Metadefender & Arbit Data Diode use case


Boaz is a senior high-tech executive with experience in Cybersecurity at the telecommunications, mobile, broadband and consumer sectors. He has strong strategic planning, execution and people management skills and successful track record in identifying growth opportunities, closing deals, sales and profit performance improvement via channels, partnerships and alliances.

.litai-modal
15.00Continuous Vulnerability Assessment and Remediation
Andriy Solomko, Sales Engineer at Bakotech

CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION

ANDRIY SOLOMKO

Sales Engineer at Bakotech

– Efficiently increase scan coverage for internal and external systems
– Reduce or eliminate the need for manual reporting and scripting
– Support and manage teams of users
– Prioritize remediation and deliver progress reports with easy to understand metrics


Experienced IT and InfoSec specialist with more than 10 years of experience. Skilled in Network Security and Vulnerability Management, DLP, SIEM, Group Policy, ITIL, and Domain Name System (DNS). Strong engineering professional with a Master’s degree focused in cryptography.

.tenableesineja-modal
15.30Next-Generation Data Protection in GDPR reality
Nicolas Luneau, Director of EMEA Channels at Digital Guardian

NEXT-GENERATION DATA PROTECTION IN GDPR REALITY

NICOLAS LUNEAU
Director of EMEA Channels at Digital Guardian

– DLP as a best tool to be prepared for GDPR
– How to protect your corporate data from outside and inside threats
– Best DLP practices and references


Nicolas has 20 years of experience in Direct and Indirect Sales & Business Development – Alliance, Channel Partner ecosystems in France/ EMEA, Cloud, SaaS and Cyber Security US Software vendors.

.digitalesineja-modal
16.00Networking Break with Partner Presentation
16.05Virtualization and Security – the Perfect Combination?
Gintaras Pelenis, Senior Systems Engineer at VMware

VIRTUALIZATION AND SECURITY – THE PERFECT COMBINATION?

GINTARAS PELENIS
Senior Systems Engineer at VMware


With over 10+ years experience in IT, Gintaras has been focusing on DataCenter Infrastructure, Storage technologies and Virtualisation. Last 3 years working at VMware as Systems Engineer, also vSAN Subject Matter Expert.

.pelenis-modal
16.30The Startup Defence
Calum Cameron, Chief Operating Officer at Investly

THE STARTUP DEFENCE

CALUM CAMERON
Chief Operating Officer at Investly

– Cyber threats evolve too fast for the defences of individual actors
– Startups as an opportunity for sustained cyber defence innovation
– Problems and Opportunities in working with startups
– Some models for collaboration


Calum is passionate about building forward facing companies and helping corporates keep-up. He is a former CEO of Startup Wise Guys and continues to advise a number of early stage companies around Europe, particularly those solving the challenges protecting our current and future digital infrastructure.

.cameron-modal
17.00Unified Security Theory, Babels Tower and Victory of Standardization – McAfee OpenDXL
Ronnie Jaanhold, Leading Consultant and Partner at Security Software

UNIFIED SECURITY THEORY, BABELS TOWER AND VICTORY OF STANDARDIZATION – MCAFEE OPENDXL

RONNIE JAANHOLD
Leading Consultant and Partner at Security Software

– The present of cyber security is in integration and automation
– There is no final product called “security”. It’s evolution.
– If security controls understand each other then they win together. Join the Borg today. Resistance is futile.


.ronnie-modal
17.30Hacking for Good
Ralph Echemendia, the Ethical Hacker and CEO of Seguru

HACKING FOR GOOD

RALPH ECHEMENDIA
The Ethical Hacker and CEO of Seguru

Ralph Echemendia is a world-renowned cyber security expert, known internationally by his alter ego “The Ethical Hacker.” For over 20 years, Ralph has delivered training on hacking and other security information to corporations including the US Marine Corps, NASA, Google, Microsoft, Oracle, AMEX, Intel, Boeing, Symantec, and IBM. American who was born in Cuba has Estonian e-residency and shares his time between Los Angeles and Tallinn. in the HQ of his company Seguru. Ralph believes that the ideal protection has more to do with detection than prevention. His moto is “You can only prevent what you can detect.”

.echemendia-modal
18.00Closure of the Conference
18.05Grand Networking Reception

Partners

Security Software is dedicated to developing and offering IT security solutions to both private and public sector. We carry out product deployments and perform on-site maintenance services for companies with different IT complexity and security standards. A large part of our everyday business consists of training and development activities to improve the overall awareness of information security threat prevention.

www.secsoft.ee

.secsoft


McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place. By building solutions that work with other companies’ products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

www.mcafee.com

.mcafee

 

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential. As of 2003, Microsoft has its local office also in Estonia.

www.microsoft.com

.microsoft


Proofpoint protects your people, data, and brand from advanced threats and compliance risks across email, mobile apps, and social media. We help you safely manage critical data as you send, store, and archive it. And we give you the intelligence, insight, and tools to respond quickly when things go wrong.

www.proofpoint.com

.proofpoint

F5 Networks provides solutions for an application world. We help organisations successfully deliver applications to anyone, anywhere, at any time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to enable their digital transformation and stay ahead of cloud, security, and mobility trends.

www.f5.com

.f5

OPSWAT is a global cyber security company providing solutions for enterprises since 2002 to identify, detect, and remediate advanced security threats from data and devices. OPSWAT is a leader in data sanitization (Content Disarm and Reconstruction), vulnerability detection, multi-scanning, device compliance, and cloud access control. To learn more about OPSWAT, please visit www.OPSWAT.com

.opswat

 

 

Sophos delivers complete IT security for businesses which means we don’t just detect threats – we help you address every point in the security lifecycle. Simple to deploy, simple to manage, and simple to use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs – a global network of threat intelligence centers.

www.sophos.com

.sophos

 

Check Point Software Technologies is a leading provider of cyber security solutions protecting customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other attacks. Check Point offers a security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive one point of control security management.

www.checkpoint.com

.checkpoint


The trusted platform provider of choice for more than 500,000 customers globally, VMware is the pioneer in virtualization and an innovator in cloud and business mobility. A proven leader, we allow you to run, manage, connect and secure applications across clouds and devices in a common operating environment, so you get both freedom and control.

www.vmware.com

.vmware

.also

Cryptshare is a communication solution for the exchange of sensitive business information. It makes it possible to send and receive e-mails and large files ad-hoc – securely, easily and at low cost. Cryptshare also offers auditability which helps companies follow compliance rules and regulations. Today more than 1400 companies use Cryptshare with about 3 million users in over 80 countries

www.cryptshare.com

.cryptshare

Arbit Security offers a complete range of Common Criteria certified (EAL 5+) Cross Domain Solutions (CDS) which lets you run high security air-gapped networks efficiently within your organization. (CDS between networks of different classifications) Using data diode technology, the Arbit Data Diode and the Arbit TRUST Gateway solves the challenges of running disconnected / air-gapped networks.

www.arbitsecurity.com

.arbit

 
.tenable

.mobileiron

.digitalguardian

.oneidentity

4Secure is the European master distributor of Owl Cyber Defense. 4Secure started its relationship with Owl Cyber Defense following a customer asking us to assess the market place and evaluate current cross-domain data diode technology. It was from this thorough review of current technologies and Owl’s unparalleled performance that 4Secure partnered with Owl. Throughout our even year partnership, 4Secure has continued to support Owl’s European development.

www.4-secure.com

.secureOWL

 


Arrow ECS is a technology enablement company that brings innovative IT solutions to market to solve complex business challenges. We deliver value-added distribution, business consulting and channel enablement services to leading technology manufacturers and their channel partners. We help businesses grow faster, operate efficiently and transform in a dynamic market.

www.arrow.com

.arrow


AlienVault is the champion of mid-size organizations that lack sufficient staff, security expertise, technology or budget to defend against modern threats. Our Unified Security Management™ (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one.

www.alienvault.com

.alienvault

Excellent Business Solutions Eesti AS is the oldest certified HansaWorld partner and sole representative in Estonia. The company takes care of smooth accounting, salary calculation, logistics, customer management, business analysis and sales for companies. Excellent is the business management software provider with the largest number of users in Estonia and has operated here since 2002. In addition to long-term experience in Estonia, the experience of Excellent also includes projects elsewhere in the world, for instance in Finland, Sweden, Latvia, the Republic of South Africa, Indonesia and Australia.

www.excellent.ee

.excellent

The Information System Authority (RIA) is a governmental organisation established in 2011. RIA is operating in the administrative area of the Ministry of Economic Affairs and Communications and coordinates the development and administration of the state’s information system, organises activities related to information security, and handles the security incidents that have occurred in Estonian computer networks.

www.ria.ee

.riapartner

.

Exclusive Group is the value-added services and technologies (VAST) group accelerating the growth of disruptive and innovative technologies around the world.

www.exclusive-networks.com

.exnetworks

 

Venue

  • The most popular event venue in Estonia
    has been chosen to host the event – Tallinn Creative Hub
    (Põhja pst 27a)
  • 100 year old
    but newly renovated power plant accommodates rooms for plenary sessions, parallel streams, networking breaks and sessions

Hotels

We have a wide selection of special accommodation deals for conference attendees. Please book your stay at a special rate directly with the hotel using the appropriate promotional code. Please note that the codes vary hotel-by-hotel and special rates and rooms are now subject to availability.

RADISSON BLU SKY <br />HOTEL TALLINN

RADISSON BLU SKY
HOTEL TALLINN

Rising above the Estonian capital, the Radisson Blu Sky Hotel provides sweeping views of the city. Our location in Tallinn city center lets visitors walk to many cultural attractions, including the historical Old Town, and the Tallinn Airport is only 4 kilometers away. Choose from 280 rooms and suites with amazing views of either the cityscape or the Gulf of Finland. Start your day with the amazing spread at Seasons Restaurant’s Super Breakfast Buffet, and finish with a nightcap at one of our on-site bars. A fitness center, private sauna and beauty spa let guests unwind or pamper themselves, while our business center and well-equipped conference rooms help them meet their business goals.

Hotel address: Rävala Puiestee 3, Tallinn

Room rates:
A special accommodation rate 115 eur applies for the standard single/double room for the participants of Summit 2018 conference during the period 19.-22.03.2018 with the Summit18 promotional code. Rooms and special rates are now subject to availability.

Rates include:

  • Buffet Breakfast
  • Access to fitness centre with gym and sauna on the 7th floor
  • Wi-Fi

Bookings can be made by:

*The reservation can be guaranteed with a credit card number or a pre-payment (for prepayment please e-mail to Hotel).
*Cancellation of an individual hotel room reservation can be made without any penalty no later than 3 days before arrival date.

RADISSON BLU HOTEL OLÜMPIA TALLINN

RADISSON BLU HOTEL OLÜMPIA TALLINN

Radisson Blu Hotel Olümpia warmly welcomes you in the city heart of Tallinn, the capital of Estonia. Hotel palette of proven quality services and cosy hotel environs tailored to your satisfaction makes it the right choice be it for business or vacation. The hotel features 390 comfortably furnished and tastefully decorated hotel rooms with modern conveniences, such as high-speed WiFi and 24-hour room service. Hotel One Touch mobile application helps to make your stay even more comfortable and enjoyable. The fitness and health center Club 26 situated on the 26th floor offers the opportunity to take a refreshing swim in a pool, work out in a well-equipped gym or relax in a hot sauna while admiring magnificent and memorable views of Tallinn. You can enjoy a delicious lunch or dinner at the hotel international restaurant Senso, a lighter meal or fresh pastries and cakes at the best café in the city - Café Boulevard, or a refreshing drink at the Lobby Bar. Radisson Blu Hotel Olümpia holds a Green-key certificate, the largest global eco-label for accommodation, and Tripadvisor Certificate of Excellence 2016 and 2017. The hotel has also been awarded the internationally recognized Safehotels certification.

Hotel address: Liivalaia 33, Tallinn

Room rates:
A special accommodation rate 95 EUR/single use and 105 EUR/double or twin use applies for the standard and superior room for the participants of Summit 2018 conference in Tallinn during the period 19.-22.03.2018 with the Summit18 promotional code. Rooms and special rates are now subject to availability.

Rates include:

  • Buffet Breakfast
  • Wi-Fi

Bookings can be made by:

*The reservation can be guaranteed with a credit card number or a pre-payment (for prepayment please e-mail to Hotel).
*Cancellation of an individual hotel room reservation can be made without any penalty no later than 3 days before arrival date.

ORIGINAL SOKOS <br />HOTEL VIRU

ORIGINAL SOKOS
HOTEL VIRU

Viru is a legendary hotel in the city centre with excellent views, and it provides a variety of services, from a restaurant featuring entertainment to beauty salons and a convention centre to a KGB Museum. The widest range of hotel rooms 423 in Tallinn is certain to include something to suit every guest.

Hotel address: Viru väljak 4, Tallinn

Room rates:
A special accommodation rate 87 €/single and 92 €/twin per room/per night applies for Standard Class room for the participants of Summit 2018 conference in Tallinn during the period 19.-22.03.2018 with the BSummit2018 promotional code. Rooms and special rates are now subject to availability.

Rates include:

  • Original Breakfast
  • Access to nightclub Café Amigo (except for special events)
  • Wi-Fi

To get special prices, please book the room at Sokos Hotels official web page:

  • Open www.sokoshotels.fi
  • On the "Get Prices" form type Tallinn as location and select Original Sokos Hotel Viru as hotel
  • Select your preferences and enter the reservation code BSUMMIT2018 to “Reservation code” field
  • If any problems, please contact Sokos Hotels Tallinn sales centre for help: +3726809300; viru.reservation@sok.fi

TALLINK CITY <br />HOTEL

TALLINK CITY
HOTEL

TALLINK CITY <br />HOTEL

TALLINK CITY
HOTEL

Tallink City Hotel is located in the heart of Tallinn, amid the popular downtown shopping and business areas and just a few minutes’ walk from the historic Old Town. Residing in a fully renovated 1970s-era shopping arcade, the modern hotel today serves as an ideal base for exploring Estonia’s beautiful capital city. Guests can enjoy an à la carte lunch or dinner at the Sume restaurant and meet up with friends and colleagues in the Piano lobby bar.

Hotel address: A. Laikmaa 5, Tallinn

Room rates:
A special accommodation rate 66 eur applies fpr standard single/double room for the participants of Summit 2018 conference in Tallinn during the period 19.-22.03.2018 with the Summit18 promotional code. Rooms and special rates are now subject to availability.

Rates include:

  • Buffet breakfast
  • Morning sauna from 8.00 - 10.00
  • Free WiFi

Bookings can be made by e-mail: hotelbooking@tallink.ee with promotional code Summit18.

 

Should you have any questions, please contact by above email or by phone +372 6300808.

TALLINK SPA & CONFERENCE HOTEL

TALLINK SPA & CONFERENCE HOTEL

Tallink Spa & Conference Hotel is located in the harbour, just about 13-minutes walk from Terminal D, and near the city centre. The hotel was opened in March 2007 and it has one of the most unique interior designs of the hotels in Tallinn downtown. The hotel has a large Aqua Spa acquatic center that provides a wide variety of saunas and pools, and Hera Salon makes available the best in beauty and wellness services. Guests are welcome to dine in the cosmic-themed à la carte Restaurant Nero or have a light snack and drinks in a contemporary lobby bar.

Hotel address: Sadama 11a, Tallinn

Room rates:
A special accommodation rate 79 eur applies for standard single/double room for the participants of Summit 2018 conference in Tallinn during the period 19.-22.03.2018 with the Summit18 promotional code.

Rates include:

  • Buffet breakfast
  • Free WiFi
  • A bathrobe and Aqua Spa pools and sauna access

Bookings can be made by e-mail: hotelbooking@tallink.ee with promotional code Summit18.

 

Should you have any questions, please contact by above email or by phone +372 6300808.