Mobile phone? Please flip device
rotera  




Agenda Day 1 (Thursday, March 15)

8:30 - 9:10 Registration
9:15 - 9:30 Welcome, Fredrik Hökegård
CEO and Founder RADPOINT
9:30 - 10:10 Keynote Speaker, Attila Narin (VP of Systems Engineering and CTO @Palo Alto Networks)
Innovation in Cyber Security and the Cloud;
Learn about the three evolutions of cyber security innovation and the latest developments at Palo Alto Networks, including the Application Framework, machine learning and user behavior analytics, and cloud security. We’ll look at some of the challenges with public cloud security, best practices for IaaS and SaaS, and also how we use the cloud to deliver security.
10:10 - 10:50 Keynote Speaker, Filip Verloy (Technical Evangelist @Rubrik)
Regaining control and visibility in a services-driven world;
The IT landscape is experiencing accelerated change, modern IT environments encompass both on-premises and cloud native based workloads, and the pressure from the business to increase agility and security is not letting up. How can we embrace this change and become an enabler for business growth while juggling with overwhelming choice and ever-changing workload requirements?
10:50 - 11:30 Keynote Speaker, Martijn Bosschaart (Sr Systems Architect @Nutanix)
A brief history of time: journey to the Enterprise Cloud;
“Going to the Cloud” is high on every CIO’s agenda. But is a movement really required? To better understand today’s challenges in the IT landscape we need to first examine where we came from. Only then can we decide on which technologies to use to really fulfil the need for a more agile enterprise IT environment. Let’s take a step back before we make two steps forward.
11:30 - 12:30 Lunch
Breakout Sessions
12:30 - 13:15
Endpoint Multi-Method Prevention Approach
Technical drill down: Secure endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.

Fredrik Lundgren, Patrick Reischl
(RADPOINT, Palo Alto Networks)
 The Next Generation of Wi-Fi, SD-WAN, and Access Management
In the past few years we have witnessed the transition of Wi-Fi as a convenience to the primary access medium. In response, standards are evolving to address the complexities of performance and density, and using software-defined architectures to quickly respond to this growing influx of users and devices across the network. In this session, learn about the new 802.11ax standard, using software-defined technologies such as SD-LAN and SD-WAN to connect people and places together faster, and controlling how and who can securely access the network using next-generation access management.

 
Perry Correll (AeroHive Networks)

Smart Data Center Infrastructure
Many of today's data centers are still based on old traditional technology, and the large manufacturers are slow upgrading their solutions. Often the same technology as before is offered, without any major news.

Today's smart infrastructure for data centers is NOT about dedicated hardware platforms, it's about innovative software technologies that creates simplicity, flexibility and scalability. This combined with so-called "commodity hardware" makes life much easier, attend this session to understand how and why.


Johan Tungström (RADPOINT Datacenter)
13:30 - 14:15
Crash Course; install the Palo Alto VM-firewalls in the public cloud (How & Why)
When your servers are placed in Azure, AWS or Google it´s time to also address security. Attend this Crash Course to understand the network fundamentals of the cloud and how (and why) virtual firewalls (VMs) from Palo Alto Networks are installed and implemented.

During our session we will:
- Demystify Public Cloud Shared Security Model
- Compare Just enough security with Next Generation Security Platform
- View into Palo Alto Networks Security Platform
- Deep Dive into Palo Alto Networks architecture for Azure and AWS
- Azure Demo
-Q&A


Dejan Stanic (Palo Alto Networks)
Data access control in a Hybrid World
How do we secure access to data? We live in a hybrid world with distributed services (On Premise, Data Center, IaaS, SaaS…) where Okta is the necessary components of identity and access management (SSO, Strong Authentication, Life Cycle Management, API Access Management). In this session Okta will perform a lab showing how data stored on premise and in the cloud can be made available to external people protected by strong authentication and Palo Alto Firewall. It will also show the integration between Okta and Logpoint. Bring your own device to join the experience.

Göran Fransson (Okta)
Simplify the IT environment with your own cloud infrastructure
Ever since VMware launched virtualization of servers, the data center infrastructure has looked quite similar with servers, fiber channel and SAN/NAS for shared storage. The investments typically take place with 3/4/5-year cycles, where best possible effort has been made to *estimate* future needs. Not rarely, under or over investments occurs.

Nutanix has taken the lead position when it comes to how to build the future data center, being the first out with hyperconverged infrastructure. What this means in practice is focusing on developing an "Enterprise Cloud Platform" that is perceived as the data center's iPhone. This means extremely easy administration, start small and expand as needed, a platform for all application services.

.. ..(Nutanix)
14:15 - 14:30 Coffee Break
14:30 - 15:30 Keynote Speaker, Jan Quach (Logpoint)
16:00 - 16:45
Advanced Log Analytics
Utilizing Machine Learning, LogPoint User and Entity Behavioral Analytics (UEBA) builds baselines for every user in the network, without creating predefined rules or signatures. By evaluating actions against baselines, the LogPoint UEBA module detects the unknown anomalies.

  Henrik Berggren (Logpoint)
Human-Centric Security
The core in all security work is *people*, understand how and why they interact with critical data.

A technical deep dive into how we effectively builds risk control and traceability of data and information.


.. .. (Forcepoint)


Backup, now is the time to move on
Perhaps backup doesnt sound like an interesting subject. You may also think that there hasn't been any important development since the introduction of snapshot technology.

Rubrik, has prioritized simplicity, automation, search-ability and archiving. Taking the system into production takes about an hour. Features like "instant recovery" do not make it worse. Attend session to understand how and why to move on from traditional backup.


Salvatore Buccoliero (Rubrik).




17:00 - 17:45
PAN-OS 8.1 Workshop
Understand important improvements like:
*Simplified application security
Application filter to allow new App-IDs
Better tools to assess the effect of App-IDs
Rule usage tracker to eliminate security risks
*Controlling risk in SaaS applications
SaaS application characteristics in App-ID
*Decryption Broker
share decrypted traffic with other devices
*Improved management
Panorama, variables in templates
Device health monitoring
New Panorama hardware models
*Advanced threat detection and prevention
Advancing detection
Extended Wildfire Visibility
Rich data for analytics
*VM-series firewalls
Google Cloud
Azure Security Center
AWS auto-scaling

  Marcus Holgersson (Palo Alto Networks)
Extreme Networks
...

.. .. (Extreme Networks)








.




18:30 Dinner and mingle with the community.

Måns Möller

Måns Möller

 Day 2 (Friday, March 16)

Breakout Sessions
Room
Flora
Gillesalen
Rediviva

  09:00-09:45
What is a Business Email Compromise (BEC) Attack? And How Can I Stop It?
How is it possible we still (2018) have problems with non wanted e-mail? i.e. Frauds, scam, advanced malware and SPAM. Definition of BEC and how to address it.

(Forcepoint)


Magnifier (Lightcyber)
Magnifier Behavioral Analytics empowers organizations to quickly find and stop the stealthiest network threats. By analyzing rich network, endpoint and cloud data with machine learning, Magnifier accurately identifies targeted attacks, malicious insiders and malware. Security analysts can rapidly investigative threats and leverage the Next-Generation Firewall to block attacks before the damage is done. Attend the session to learn the key features and benefits of Magnifier.

Bertrand Le Bail (Palo Alto Networks)
Disaster insurance; "costly and complex" or "easy and cost-effective"?
For many disaster recovery means investments in secondary data centers, with additional servers and SAN, to take over all (or part) of IT operations. This then needs to be interconnected with network infrastructure for synchronous or asynchronous mirroring, usually at the storage level. Due to complexity, disaster preparedness (actual fail-over) is rarely or never tested.

Zerto makes it possible to replicate virtual machines and applications close to real-time. The secondary site may be in your own secondary data center, or a public cloud service such as Microsoft Azure or Amazon AWS. You can anytime validate the disaster recovery plan without any impact on the actual production.




TBA (TBA)



10:00 - 11:00 Customer Case Study - Trip to a Smarter Data Center - story from reality, 2017
11:00 - 11:15 Coffee Break
11:15-12:00
Secure your SaaS as part of your Enterprise security strategy
During this interactive demonstration, you will be shown how Palo Alto Networks:
- gives you full visibility on your users SaaS usage and visibility on all of your data that resides in the sanctioned SaaS applications,
- can simply implement and enforce DLP policies on your data
- can find known and unknown threats for data in transit and data at rest
- works like a platform; integrated and automated to prevent successful breaches.
- can help your speed up the workflows of your threat researchers and infosec teams.


.. Ronald den Braven(Palo Alto Networks)


Palo Alto MineMeld Workshop Hands-on
Robert Mört, Palo Alto expert at RADPOINT, presents MineMeld. Based on an extremely flexible engine, MineMeld can be used to collect, aggregate and filter indicators from a variety of sources and make them available for consumption to peers or to the Palo Alto Networks security platforms.
Allow – Dynamic lists of IP addresses in security and decryption policys (e.g. white list Office 365)
Block – Block known malicious sources and destinations based upon free RBL (Real Time Blocking) lists.
Analyze – Audit and correlate historic logs against new information
Share – Share threat information in your infrastructure with trusted partners and peers
 Robert Mört (RADPOINT)
Switching for the Smart Data Center

We describe how to "practically" build data center network infrastructure that easily scales with your needs - within one or more data centers.

Jonas Åström (RADPOINT Datacenter)


12:00 - 13:00 Lunch