MALMÖ | STOCKHOLM | UMEÅ
Cybersecurity Summit2024
- MALMÖ
- STOCKHOLM
- UMEÅ
FROM BREACH TO REBUILD
Prevent Cyber Breach & Fight Cybercrime Tour
Join us for a full day of cybersecurity insights at this year’s event. Discover the latest techniques used by cybercriminals and learn how to secure your IT environments. Engage with industry experts and like-minded professionals.
LEVEL UP YOUR GAME
Hands-On Tips & Tools
Level up your cybersecurity skills by exploring cybercriminals’ hacking techniques, or how to create a robust defense for your IT environments. Dive into both offensive and defensive aspects with hands-on experiences and cutting-edge tools.
LEARN FROM REAL OPERATORS
Based on Real Experience
Join some of the industry’s top cybersecurity specialists as they share their extensive knowledge and years of field experience. Gain insights into recent cyber attacks and significant incidents we have handled over the past year.
WATCH FROM HOME
Livestream or In Person
Join us in person at our venues in Malmö, Stockholm, or Umeå. You can also connect from anywhere, livestream our technical sessions, and engage with our experts in our live chat. Reserve your spot now!
We present our
Speakers
Alexander Andersson
Principal Forensic Investigator and Cybersecurity Expert
Daniel Jaurén
Lead Threat Intelligence
David Lilja
Senior Threat Analyst
Hasain Alshakarti
Principal Cyber Security Advisor
Mats Hultgren
Director of Operations CSIRT
Mikael Nyström
Principal Technical Architect
Mikkel Ole Rømer
Head of Offensive Security in Denmark
Nicklas Keijser
Threat Intelligence Research Analyst
Petter Fahlström
COO Truesec Detect
Guest Speakers
Bastian Jacobsson
Security Engineer, CrowdStrike
Navid Molavi
Security Engineer, Vectra
To Be Announced Soon
Join us in
Umeå - 24 september
Click for agenda and venueUmeå - 24 Sept
Agenda and schedule
08.30-09.00
Registration and coffee.
09.00-09.20
The Current Cyber Threat Landscape
🇸🇪 Language: Swedish
Markus Lassfolk
09.20-09.55
In the mind of an attacker – Vulnerabilities and Misconfigurations
🇸🇪 Language: Swedish
Alexander Andersson
09.55-10.30
What’s new in Windows Server/Client and Azure? Next Gen is already here
🇸🇪 Language: Swedish
Hasain Alshakarti and Mikael Nyström
11.00-11.35
How to protect your devices and identities – Detection on the modern endpoint
🇸🇪 Language: Swedish
David Lilja and Bastian Jacobsson
11.45-12.20
Detection on the modern network
🇸🇪 Language: Swedish
David Lilja and Navid Molavi
13:15-13.50
Purple Teaming – How Red and Blue make a difference together!
🇸🇪 Language: Swedish
Alexander Andersson, David Lilja, Hasain Alshakarti
13.50-14.25
The art of understanding an attack – Reverse engineering and malware analysis
🇸🇪 Language: Swedish
Alexander Andersson
14.55-15.30
The bare minimum – If you do nothing else, do this!
🇸🇪 Language: Swedish
Hasain Alshakarti and Mikael Nyström
15.30-16.30
Closing keynote and Q&A
🇸🇪 Language: Swedish
Featuring All Speakers
16.30
After Sessions Mingle
Our event venue
We Meet at Clarion Hotel Umeå
Join us in
Stockholm - 26 september
Click for agenda and venueStockholm - Sept 26
Agenda and schedule
08.30-09.00
Registration and coffee.
09.00-09.20
The Current Cyber Threat Landscape
🇸🇪 Language: Swedish
Mats Hultgren
09.20-09.55
In the mind of an attacker – Vulnerabilities and Misconfigurations
🇸🇪 Language: Swedish
Alexander Andersson
09.55-10.30
What’s new in Windows Server/Client and Azure – Next Gen is already here
🇸🇪 Language: Swedish
Hasain Alshakarti and Mikael Nyström
11.00-11.35
How to protect your devices and identities – Detection on the modern endpoint
🇸🇪 Language: Swedish
David Lilja and Bastian Jacobsson
11.45-12.20
Detection on the modern network
🇸🇪 Language: Swedish
David Lilja and Navid Molavi
13:15-13.50
Purple Teaming – How Red and Blue make a difference together!
🇸🇪 Language: Swedish
Alexander Andersson, David Lilja, Hasain Alshakarti
13.50-14.25
The art of understanding an attack – Reverse engineering and malware analysis
🇸🇪 Language: Swedish
Alexander Andersson
14.55-15.30
The bare minimum – If you do nothing else, do this!
🇸🇪 Language: Swedish
Hasain Alshakarti and Mikael Nyström
15.30-16.30
Closing keynote and Q&A
🇸🇪 Language: Swedish
Featuring All Speakers, hosted by Mats Hultgren
16.30
After Sessions Mingle
Our event venue
Meet Us at Hamburger Börs Stockholm
Join us in
Malmö - 1 october
Click for agenda and venueMalmö - Oct 1
Agenda and schedule
08.30-09.00
Registration and coffee.
09.00-09.20
The Current Cyber Threat Landscape
🇬🇧 Language: English
Petter Fahlström
Livestream host: Björn Andersson
09.20-09.55
In the mind of an attacker – Vulnerabilities and Misconfigurations
🇬🇧 Language: English
Mikkel Romer and Nicklas Keijser
09.55-10.30
What’s new in Windows Server/Client and Azure – Next Gen is already here
🇬🇧 Language: English
Hasain Alshakarti and Mikael Nyström
11.00-11.35
How to protect your devices and identities – Detection on the modern endpoint
🇬🇧 Language: English
David Lilja and Bastian Jacobsson
11.45-12.20
Detection on the modern network
🇬🇧 Language: English
David Lilja and Navid Molavi
12:20-12.55
Purple Teaming – How Red and Blue make a difference together!
🇬🇧 Language: English
David Lilja, Hasain Alshakarti, Mikkel Romer
14.00-14.35
The art of understanding an attack – Reverse engineering and malware analysis
🇬🇧 Language: English
Nicklas Keijser
14.35-15.10
The bare minimum – If you do nothing else, do this!
🇬🇧 Language: English
Hasain Alshakarti and Mikael Nyström
15.40-16.30
Closing keynote and Q&A
🇬🇧 Language: English
Featuring All Speakers, hosted by Petter Fahlström
16.30
After Sessions Mingle
Our event venue
Meet Us at Studion Meetingpoint/Blackbox in Malmö
Sponsors
Gold Partners
CrowdStrike is a global cybersecurity leader and has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
CrowdStrike: We stop breaches.
Vectra AI is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Organizations worldwide rely on the Vectra AI Platform and MDR services to move at the speed and scale of hybrid attackers.
Sponsors
Exhibiting Partners
Dustin is a leading online IT partner in the Nordics and Benelux. We help our customers to stay in the forefront by providing them with the right IT solution at the right time and at the right price. With our high-level IT expertise, broad offering and pragmatic attitude, we act as a strategic IT partner primarily for small and medium-sized businesses, but also for large-sized businesses, the public sector and consumers.
Nimblr is a Swedish limited liability company based in Malmö. Nimblr’s innovative Security Awareness solutions are based on combined knowledge from the IT industry, e-learning, teaching and website development.
The Swedish Red Cross works to ensure that no one is left alone in a disaster. Together with 190 other National Societies, we form the world’s largest humanitarian network.
Cybersecurity Summit 2024
Get Your Ticket
Check out last years event
Frequently Asked Questions
What is the ticket price?
We offer two ticket types with the pricing:
- Onsite tickets: 4 500 SEK excl. VAT
- Livestreaming tickets: 4 000 SEK excl. VAT
Can I trade my onsite ticket for a streaming ticket?
Yes you can trade your ticket, but the price will be the same.
Can I change the name on a ticket?
Yes, of course. Just send an email to hello [at] truesec.com and let us know the name of the new attendee.
I have a question, how do I contact you?
If you have any questions regarding ticket sales, please reach out to Ticket Sales here.
For general questions, please contact us:
I have an issue with my payment, can you help me?
Crossword hints
Across
4. The unauthorized transfer of data from a computer.
5. An attack aimed at disrupting service by overwhelming the target with traffic.
8. A trial-and-error method used to decode encrypted data, such as passwords.
9. The process of managing software updates to fix vulnerabilities.
10. A method bypassing normal authentication to gain unauthorized access to a computer.
Down
1. The application of scientific methods to collect and analyze digital evidence.
2. A system designed to detect unauthorized access or anomalies in network traffic.
3. The process of converting data into a fixed-size string of characters, typically a one-way function.
6. A security measure that physically isolates a computer or network from other networks.
7. Information that organizations use to understand the threats that have, will, or are currently targeting them.
Leave your response in our Cyber War Room, and a winner will be drawn by the end of the event. Good luck!