

Computer Sweden &
March 14, 2018 | Hotel Miss Clara, Stockholm
WELCOME to an exclusive evening of stimulating lectures and in-depth discussions.
Don’t Be the Next Marriott: How to Get Ahead of Cyber Risk During Rapid Change
In November 2018, Marriott hotels disclosed a data breach affecting up to 383 million records of its guest database — a breach that likely began in 2014 and was inherited by Marriott when it acquired Starwood Hotels & Resorts in 2016.
In September 2017, credit reporting agency Equifax revealed a breach affecting 145 million customers, based on unauthorized access to company systems five months earlier.
According to studies, the median dwell time in a cybersecurity incident is 101 days, meaning attackers can evade detection for three months.
So how do you avoid being the next victim of stealth attackers? This is something we, Computer Sweden and Illusive Networks, would like to discuss with you at an exclusive executive roundtable dinner on March 14 at Hotel Miss Clara on Sveavägen 48, Stockholm.
The discussion will highlight the cyber risks that can accompany periods of rapid change, including mergers and acquisitions, and how to deter and detect stealth attackers that can silently live within enterprise environments.
During the evening we will also touch upon topics such as:
- Threat detection – challenges and best practice
- Threat protection – it is not enough to protect the basics
- Threat intelligence – how to keep up with trends in the cyberthreat landscape
- New adversaries – who should you be afraid of today
- Risk management – how to stay on top of security during periods of rapid change
- Security vs innovation – how to manage security while pursuing growth and new business opportunities
Agenda:
- 17.00: Welcome drink
- Lecture: Robert Willborg. ”The Foundation in Security and Digitization – a Session of Security Culture, the How and Why”
- Appetizer
- Lecture: Pekka Puska
- Main course
- Discussion
- Dessert
- 22.00 Conclusion
Moderating the discussions will be Marcus Jerräng, editor-in-chief of Computer Sweden.
Registration:
This is an invite-only event, to which you have received an exclusive VIP invitation. Attendance is limited. Please register by e-mail to: alexandra.appelqvist@idg.se
You will be meeting:

Marcus Jerräng
Chefredaktör IDG

Robert Willborg
CISO
Robert has an extensive background in security issues, information security and behaviour, but also in security law. He has a background from the Swedish armed forces in security and intelligence service.
Since 2010, Robert Willborg has worked strategically and advisory in information security with a focus on secure digital ecosystems, processes and methods at a management level. Behaviour and culture are topics Robert has lectured on internationally over the past 18 months. He is a certified DPO and works extensively with security legal issues. Robert has also published several articles on digital security topics. In his advisory role, Robert is a member of IDG Sweden’s Expert Network.

Pekka Puska
Regional sales manager, North Europe, Illusive Networks
Pekka’s expertise in security developed since starting his IT career with Cisco in The Netherlands. From becoming an Inside Sales Account Manager, his role developed into a managerial capacity while helping organizations address their security challenges. As a Cyber Security Sales lead for both Cisco and IBM (following an engagement with Cygate working in Network Security) he helped clients identify and implement architectural solutions to mitigate damage from the developing threat landscape. An experienced presenter, Pekka joined Illusive Networks to help grow awareness and educate clients about the impact and growing capabilities of human-based attacks.

Marcus Jerräng
Chefredaktör IDG

Robert Willborg
CISO
Robert has an extensive background in security issues, information security and behaviour, but also in security law. He has a background from the Swedish armed forces in security and intelligence service.
Since 2010, Robert Willborg has worked strategically and advisory in information security with a focus on secure digital ecosystems, processes and methods at a management level. Behaviour and culture are topics Robert has lectured on internationally over the past 18 months. He is a certified DPO and works extensively with security legal issues. Robert has also published several articles on digital security topics. In his advisory role, Robert is a member of IDG Sweden’s Expert Network.
Lecturer: Robert Willborg
Robert Willborg has an extensive background in security issues, information security and behaviour, but also in security law. He has a background from the Swedish armed forces in security and intelligence service.
Since 2010, Robert Willborg has worked strategically and advisory in information security with a focus on secure digital ecosystems, processes and methods at a management level. Behaviour and culture are topics Robert has lectured on internationally over the past 18 months. He is a certified DPO and works extensively with security legal issues. Robert has also published several articles on digital security topics. In his advisory role, Robert is a member of IDG Sweden’s Expert Network.
and
John Hurley
CISSP, Senior Sales Engineer, Illusive Networks
John is a Certified Information System Security Professional (CISSP). He is an experienced information security consultant with more than twenty years in the IT and information security areas. Besides experience in information security business development, John has experiences ranging mainly from consulting, design, implementation and support of large security projects through both security resellers and security vendors covering multiple security domains. This wide exposure to various security disciplines has helped him provide advice to customers on how to enhance their security programs by orchestrating technology and operational procedures together to build a more efficient operating model for his customers.
Details
Location: Hotel Miss Clara, Sveavägen 48, Stockholm.
Conference room: “Terrassen”
Time: 17:00–22:00.
Date: March 14, 2018
Questions? Please e-mail alexandra.appelqvist@idg.se
“Illusive Networks are the perfect example of the kind of ‘outside the box’ thinking necessary to challenge the growing threat of targeted attacks.”
– Eric Schmidt, Google chairman & founding partner at Innovation Endeavors
Skicka in din intresseanmälan här
Det här är ett invite only-event. Lämnar en intresseanmälan i formuläret nedan om du vill bli inbjuden.
Illusive Networks
Illusive Networks empowers security teams to reduce the business risk created by today’s advanced, targeted threats by destroying an attacker’s ability to move laterally toward critical assets. Illusive reduces the attack surface to preempt attacks, detects unauthorized lateral movement early in the attack cycle, and provides rich, real-time forensics that enhance response and inform cyber resilience efforts. Agentless and AI driven, Illusive technology enables organizations to proactively intervene in the attack process, avoid operational disruption and business losses, while functioning with greater confidence in today’s complex, hyper-connected world.
Visit us at illusivenetworks.com or contact info@illusivenetworks.com or follow us on LinkedIn, @Illusivenw on Twitter and Facebook.

