TrueSec Events har en ny webbplats:


08:30 - 09:00

Registration & coffe

09:00 - 09:15

Day 1 | Keynote

Let’s kick off this two-days konference with a TED-talk-inspired keynote starring Marcus Murray, cyber security expert and team manager at TrueSec.

09:15 - 10:15

Day 1 | Session 1 - Attack: Breaching the perimeter! - Finding and exploiting entry points

Let the fun begin…

10:15 - 10:30


10:30 - 11:30

Day 1 | Session 2 - Attack: Expand & Conquer! – Complete IT infrastructure takeover

We expose even more attack scenarios.

11:30 - 12:30


12:30 - 13:30

Day 1 | Session 3 - Protect: Identities in the Enterprise

Identity has become one of the most important security boundaries and critical endpoints in modern enterprises. The natural replacement for the network security perimeter in a complex modern enterprise is the authentication and authorization controls in an organization's identity layer. Privileged administrative accounts are effectively in control of this new "security perimeter".

13:30 - 13:45


Time to stretch your legs!

13:45 - 14:45

Day 1 | Session 4 - Protect: Securing the on-premise infrastructure

When analyzing the numerous breaches over the past few years, one quickly concludes that no matter what method was used to breach the environment, the attackers proceed to compromise administrator credentials and devices so that they can integrate, control and hide inside the environment.

14:45 - 15:00


Last break of the day.

15:00 - 16:00

Day 1 | Session 5 - Protect: Modern Application Security

Most of us are heavily dependent on software from larger vendors like Google, Microsoft and Apple. Continuously applying security patches from these vendors is nowadays considered a minimum in cyber security. Security has been a key part of the vendors's SDLC (Software Development Lifecycle) for many years now. Still, our exposure to cyber security threats involves a lot more than products from these larger software companies. Attackers exploit application vulnerabilities to gain control over entire enterprises, even with all the latest patches applied.

16:00 - 17:30

Q&A's and mingle in the bar

Last 30 minutes to get answers to your questions!

09:00 - 09:15

Day 2 | Opening speach

Summary of day one and set the stage for day two.

09:15 - 10:15

Day 2 | Session 1 - Protect: Secure Application Infrastructure on AWS

This time, we'll go deep....

10:30 - 11:30

Day 2 | Session 2 - Protect: Develop, secure and govern your application on Azure

Get a practical insight in some of the security features the Microsoft cloud can provide.

12:30 - 13:30

Day 2 | Session 3 - Protect: Protecting Sensitive Data

As attacks are getting more and more advanced and the tools of nation states have become available to cybercrime, we must assume breach - all environments will get hacked sooner or later. In addition, the business need for digitalization, sourcing and move to cloud expose data for new risks. Encryption of data becomes more important, not least because of regulatory demands such as GDPR.

13:45 - 14:45

Day 2 | Session 4 - Detect/Repond: Develop your capability to detect and respond to cyber attacks

It is a matter of national concern that so few organizations have eyes on what happens in their networks and systems.

15:00 - 16:00

Day 2 | Session 5 - Attack: Nation-state sponsored attacks! Advanced attacks & anti-detection techn.

Attack scenarios 1 and 2, against protected environments.

16:00 - 16:15

Day 2 | Summary Keynote

15 minutes to sum up the event.

Dagen innehöll en mängd spännande sessioner från våra föreläsare.


Se mer om sessionerna genom att klicka på sessionerna i agendan till vänter.