Mobile phone? Please flip device
roteraenglish = English Speaking Session  

Agenda Day 1 (Thursday, March 15)

8:30 - 9:10 Registration
9:15 - 9:30 Welcome, Fredrik Hökegård
CEO and Founder RADPOINT
9:30 - 10:10 Keynote Speaker, Attila Narin (VP of Systems Engineering and CTO @Palo Alto Networks)
Innovation in Cyber Security and the Cloud;
Learn about the three evolutions of cyber security innovation and the latest developments at Palo Alto Networks, including the Application Framework, machine learning and user behavior analytics, and cloud security. We’ll look at some of the challenges with public cloud security, best practices for IaaS and SaaS, and also how we use the cloud to deliver security. english
10:10 - 10:50 Keynote Speaker, Filip Verloy (Technical Evangelist @Rubrik)
Regaining control and visibility in a services-driven world;
The IT landscape is experiencing accelerated change, modern IT environments encompass both on-premises and cloud native based workloads, and the pressure from the business to increase agility and security is not letting up. How can we embrace this change and become an enabler for business growth while juggling with overwhelming choice and ever-changing workload requirements? english
10:50 - 11:30 Keynote Speaker, Martijn Bosschaart (Sr Systems Architect @Nutanix)
A brief history of time: journey to the Enterprise Cloud;
“Going to the Cloud” is high on every CIO’s agenda. But is a movement really required? To better understand today’s challenges in the IT landscape we need to first examine where we came from. Only then can we decide on which technologies to use to really fulfil the need for a more agile enterprise IT environment. Let’s take a step back before we make two steps forward. english
11:30 - 12:30 Lunch
Breakout Sessions
12:30 - 13:15
Endpoint Multi-Method Prevention Approach (TRAPS 5 Hands-On Lab)
Secure endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers. This hands-on lab will cover new Traps features including: Cloud Hosted Management, use of Logging Service, and new Endpoints.

Patrick Reischl (Palo Alto Networks)

 The Next Generation of Wi-Fi, SD-WAN, and Access Management
In the past few years we have witnessed the transition of Wi-Fi as a convenience to the primary access medium. In response, standards are evolving to address the complexities of performance and density, and using software-defined architectures to quickly respond to this growing influx of users and devices across the network. In this session, learn about the new 802.11ax standard, using software-defined technologies such as SD-LAN and SD-WAN to connect people and places together faster, and controlling how and who can securely access the network using next-generation access management.

Perry Correll (AeroHive Networks)


Smart Data Center Infrastructure
Many of today's data centers are still based on old traditional technology, and the large manufacturers are slow upgrading their solutions. Often the same technology as before is offered, without any major news.

Today's smart infrastructure for data centers is NOT about dedicated hardware platforms, it's about innovative software technologies that creates simplicity, flexibility and scalability. This combined with so-called "commodity hardware" makes life much easier, attend this session to understand how and why.

Johan Tungström (RADPOINT Datacenter)

13:30 - 14:15
Crash Course; install the Palo Alto VM-firewalls in the public cloud (How & Why)
When your servers are placed in Azure, AWS or Google it´s time to also address security. Attend this Crash Course to understand the network fundamentals of the cloud and how (and why) virtual firewalls (VMs) from Palo Alto Networks are installed and implemented.

During our session we will:
- Demystify Public Cloud Shared Security Model
- Compare Just enough security with Next Generation Security Platform
- View into Palo Alto Networks Security Platform
- Deep Dive into Palo Alto Networks architecture for Azure and AWS
- Azure Demo

Dejan Stanic (Palo Alto Networks)

Data access control in a Hybrid World
How do we secure access to data? We live in a hybrid world with distributed services (On Premise, Data Center, IaaS, SaaS…) where Okta is the necessary components of identity and access management (SSO, Strong Authentication, Life Cycle Management, API Access Management). In this session Okta will perform a lab showing how data stored on premise and in the cloud can be made available to external people protected by strong authentication and Palo Alto Firewall. It will also show the integration between Okta and Logpoint. Bring your own device to join the experience.

Göran Fransson (Okta)
Simplify the IT environment with your own cloud infrastructure
Ever since VMware launched virtualization of servers, the data center infrastructure has looked quite similar with servers, fiber channel and SAN/NAS for shared storage. The investments typically take place with 3/4/5-year cycles, where best possible effort has been made to *estimate* future needs. Not rarely, under or over investments occurs.

Nutanix has taken the lead position when it comes to how to build the future data center, being the first out with hyperconverged infrastructure. What this means in practice is focusing on developing an "Enterprise Cloud Platform" that is perceived as the data center's iPhone. This means extremely easy administration, start small and expand as needed, a platform for all application services.

.. ..(Nutanix)
14:15 - 14:45 Coffee Break
14:45 - 15:45 Keynote Speaker, Jan Quach (Solutions Director @Logpoint)
”Information Security as a Business Unit”
16:00 - 16:45
Advanced Log Analytics
Utilizing Machine Learning, LogPoint User and Entity Behavioral Analytics (UEBA) builds baselines for every user in the network, without creating predefined rules or signatures. By evaluating actions against baselines, the LogPoint UEBA module detects the unknown anomalies.

  Henrik Berggren (Logpoint)
Human-Centric Security: Part 1 - information
In this first session, we will look closer at information. As information now resides everywhere and are used from everywhere, organisations will need new methods to trace, and potentially stop, how information is leaked. The session will cover the basics of Risk Adaptive Protection and a live demo of how information can be found, and protected, regardless of location.
(*) The core in all security work is *people*, which has been the only true constant since the dawn of IT. And as traditional cybersecurity perimeters dissolve, the human point is what remains. With better understanding of how people work, and how they interact with assets, we can cut through the ever increasing noise of events and alerts. In a world where we don’t own the internet, people work from anywhere and information is everywhere, the need to focus on humans and data – the behavior and how information is used - has never been greater. With our human centric Risk Adaptive Protection, Forcepoint enable organisations to utilize and maximize their already-made investments in IT. Forcepoint have a unique background in protecting some of the most sensitive organisations on the planet.

.. .. (Forcepoint)


Backup, now is the time to move on
Perhaps backup doesnt sound like an interesting subject. You may also think that there hasn't been any important development since the introduction of snapshot technology.

Rubrik, has prioritized simplicity, automation, search-ability and archiving. Taking the system into production takes about an hour. Features like "instant recovery" do not make it worse. Attend session to understand how and why to move on from traditional backup.

Salvatore Buccoliero (Rubrik).


17:00 - 17:45
Extreme Networks Fabric Connect, fully Automated and Secure
Suitable in deployment scenarios that require high-availability, network segmentation, and dynamic provisioning. it is uniquely designed to eliminate network complexity and increase agility, augment network security and optimize quality of experience for all users & devices.

During this session we will show you that automation is key to control your network in a simple and flexible way and to enable and securely consolidate services and devices.

  (Extreme Networks with RADPOINT)
PAN-OS 8/8.1 Workshop
Understand important improvements like:
*Simplified application security
Application filter to allow new App-IDs
Better tools to assess the effect of App-IDs
Rule usage tracker to eliminate security risks
*Controlling risk in SaaS applications
SaaS application characteristics in App-ID
*Decryption Broker
share decrypted traffic with other devices
*Improved management
Panorama, variables in templates
Device health monitoring
New Panorama hardware models
*Advanced threat detection and prevention
Advancing detection
Extended Wildfire Visibility
Rich data for analytics
*VM-series firewalls
Google Cloud
Azure Security Center
AWS auto-scaling

Marcus Holgersson (Palo Alto Networks)

Velocloud, Software-defined WAN, replace MPLS/IPSec
Pulling your hair managing the spider webs of intra-office IPSec tunnels? Tired of paying through the nose for less-than-great capacity MPLS connections? With a simple and intuitive interface, a good range of hardware and a worldwide network of cloud gateways, Velocloud delivers a flexible and robust SD-WAN solution. In this seminar Jonas Åström will familiarize you with the Velocloud SD-WAN solution. From managing the solution, integrating cloud/IAAS/SaaS services directly to your WAN and troubleshooting your connections. Put yourself in the WAN driver’s seat. Managing office connections probably couldn’t be easier.

Jonas Åström (RADPOINT).

18:30 Dinner and mingle with the community.

Måns Möller

Måns Möller

 Day 2 (Friday, March 16)

Breakout Sessions

Human-Centric Security: Part 2 - Humans
In this second session, we will focus on our most valuable of assets – Humans. Forcepoint UEBA interacts with other technologies and maximize already made investments, to not only visualize the truly risky events but also to dynamically change policies to prevent bad things from happen. We will dive deeper into the technologies which focus on human behavior, including a demonstration of this cutting edge technology where we don’t focus only on the behavior of machines, but of the actual people as well.


Magnifier (Lightcyber)
Magnifier Behavioral Analytics empowers organizations to quickly find and stop the stealthiest network threats. By analyzing rich network, endpoint and cloud data with machine learning, Magnifier accurately identifies targeted attacks, malicious insiders and malware. Security analysts can rapidly investigative threats and leverage the Next-Generation Firewall to block attacks before the damage is done. Attend the session to learn the key features and benefits of Magnifier.

Bertrand Le Bail (Palo Alto Networks)
Disaster insurance; "costly and complex" or "easy and cost-effective"?
For many disaster recovery means investments in secondary data centers, with additional servers and SAN, to take over all (or part) of IT operations. This then needs to be interconnected with network infrastructure for synchronous or asynchronous mirroring, usually at the storage level. Due to complexity, disaster preparedness (actual fail-over) is rarely or never tested.

Zerto makes it possible to replicate virtual machines and applications close to real-time. The secondary site may be in your own secondary data center, or a public cloud service such as Microsoft Azure or Amazon AWS. You can anytime validate the disaster recovery plan without any impact on the actual production.

Egon van Dongen (Zerto)

10:00 - 11:00

Customer Case Study - LKAB´s Trip to a Smarter Data Center - story from reality, 2017
Robert Pohjanen
11:00 - 11:15 Coffee Break
Secure your SaaS as part of your Enterprise security strategy
During this interactive demonstration, you will be shown how Palo Alto Networks:
- gives you full visibility on your users SaaS usage and visibility on all of your data that resides in the sanctioned SaaS applications,
- can simply implement and enforce DLP policies on your data
- can find known and unknown threats for data in transit and data at rest
- works like a platform; integrated and automated to prevent successful breaches.
- can help your speed up the workflows of your threat researchers and infosec teams.

Ronald den Braven(Palo Alto Networks)

Palo Alto MineMeld Workshop Hands-on
Robert Mört, Palo Alto expert at RADPOINT, presents MineMeld. Based on an extremely flexible engine, MineMeld can be used to collect, aggregate and filter indicators from a variety of sources and make them available for consumption to peers or to the Palo Alto Networks security platforms.
Allow – Dynamic lists of IP addresses in security and decryption policys (e.g. white list Office 365)
Block – Block known malicious sources and destinations based upon free RBL (Real Time Blocking) lists.
Analyze – Audit and correlate historic logs against new information
Share – Share threat information in your infrastructure with trusted partners and peers
 Robert Mört (RADPOINT)
Switching for the Smart Data Center
Jonas Åström, datacentre networking consultant and partner at Layer 8, will show you how to build integrated, intelligent and scalable networks. Inspired by solutions from the cloud titans (Amazon, Google, Facebook) and adapted for the needs of the modern enterprise. State-streaming, automated network provisioning and active-active redundancy are some of the features covered. After this technical session you will have the inspiration to make your own network smarter.

Jonas Åström (RADPOINT Datacenter)

12:00 - 13:00 Lunch