skip to Main Content



Nordic-Baltic Security Summit 2018

Overview video

Michael N. Schmitt

Responding to Cyber Operations

Elsa Neeme

Estonian Cyber Security Act – Ensuring Public Order In Cyber Domain

Liis Vihul

International Law Restrictions on Offensive Cyber Activity

Larry Cashdollar

Threat brief: DDoS, Credential Reuse, IoT Botnets, Bitcoin Mining malware, Spectre, Meltdown

Marina Kaljurand

How to Protect Critical Infrastructure?

Merike Käo

2007 and 2017 Incidents – Have We Learned to Respond Better?

David Karlsson

People Centric Security – the New Paradigm in Cybersecurity

Peeter Koppel

Cryptocurrency – It’s Not Even Real Money and Still They Want to Take it Away From You!

Andres Elliku

CERT-EE S4A: an Open-Source Solution for Distributed Network Security Monitoring

Per Söderqvist

Designing Proactive IT Security

Wim Zandee

A Real Life Case Study How a Service Provider for Healthcare Exposed All Customer Details

Kristian Stoddart

Protection of Critical National Infrastructure from Cyber Attack (presentation via Skype)

Nicolas Luneau

Next-Generation Data Protection in GDPR reality

Juha Sallinen

GDPR Checklist – are you Ready for the Regulation Enforcement in May?

Harri Hämäläinen

How to Maintain Business Equally Secured in Corporate Network and Cloud

Ole Tom Seierstad

Cyber Defense Operations – Protecting Everything Against Unknown?

Rain Ottis

Selected lessons from the 2017 ID-Card case

Calum Cameron

The Startup Defence

Ronnie Jaanhold

Unified Security Theory, Babels Tower and Victory of Standardization – McAfee OpenDXL

Ralph Echemendia

Hacking for Good


Martin Scherrer

One Identity Fall Update

Achim Brinkmann

Unified Security Theory, Babels Tower and Victory of Standardization – McAfee OpenDXL

Gintaras Pelenis

Virtualization and Security – the Perfect Combination?


Photos by Joanna Jõhvikas