The unifying theme of this year's Summit was "Human-centered security design".
While technology continues to evolve rapidly, one factor in safety remains constant: the human factor. Human error remains one of the leading causes of data breaches and security incidents "The system doesn't make mistakes, only humans make mistakes" - this refers both to human errors in the design of a system and to the fact that a human doing a manual job makes more mistakes than a meticulously designed system. Which, again, only makes mistakes if it is a human who made the mistake in the process of designing it. This is why a new paradigm is emerging: human-centered safety design that also complies with all laws and safety regulations.
What was the focus on?
- Those who will be affected - critical infrastructure and government facilities, as well as all other sectors covered by the NIS2 Directive;
- All professionals working in the security industry - managers at different levels, security technology vendors, installers and technicians.
What does it mean?
In essence, it is an approach that puts people at the center of the design process, taking into account their behaviour, needs and constraints. It is about making security intuitive, effortless and user-friendly, reducing the likelihood that users will make mistakes or circumvent security measures.
Human-centered safety design defines the importance of the employee experience throughout the control management lifecycle. By 2027, 50% of security managers in large enterprises will have adopted human-centered security design practices to reduce cyber security threats and increase control implementation.
This topic focuses on user-friendly safety technologies, their integration into safety design, and human behaviour in shaping safety outcomes. It not only reflects current trends in security technologies, but also highlights the importance of adaptability, user-centricity and sustainability in the development of security policy.
Each responsible person in the company is responsible for a specific segment of the security policy, as well as for a solution or group of solutions within their department. There are situations where those responsible, in consultation with security companies, purchase the cheapest solution without even realizing that it does not meet the security requirements, both in terms of application and regulatory documents.
As of 10 November 2022, the NIS2 Directive has entered into force, which requires that the security system must be flawless and unbreakable. The system must meet the general security requirements and be an integral part of the company's overall ICT systems.
The total cost of cyber security incidents is expected to fall by €11.3* billion in the 3-4 years after NIS2 is implemented.
*Source: Impact assessment report
The Summit therefore aims to provide the following information to everyone attending:
How to choose the right security systems (CCTV, access control, security systems, etc.)?
How to adapt security systems to your needs?
How do I know if my existing security system meets the requirements of the NIS2 Directive?
What needs to be considered when introducing new or upgrading existing security systems to meet the requirements of the NIS2 Directive?
Where can I get help with the design and installation of security systems?
How can I protect myself from sanctions and avoid harsh penalties?
What was the value of your attendance?
Here are just few reasons why everyone had to attend the industry's most important summit in autumn. Plus, you could enjoy networking in a relaxed atmosphere, having a great time with like-minded people, and live music to round off a peaceful day.
What is covered by the new NIS2 Directive?
- Essential service providers, critical service providers and owners and legal holders of critical information communication technology infrastructure.
- Direct and indirect public administrations, public derivatives and other public bodies, as well as legal entities governed by private law which perform a task delegated by the public administration, with the exception of national security authorities.
- Legal persons governed by the law.
- In the cases provided for by law, to natural persons participating in a coordinated vulnerability disclosure process*.
* Source: National Cyber Security Act
It will cover the following sectors:
All medium and large companies operating in sectors covered by the new Directive will have to comply with NIS2.
What are the risks if a company's cybersecurity measures do not meet the requirements?
Source: National Cyber Security Act
Fines of up to EUR 10 million or 2% of total annual turnover
Direct management responsibility (company management, heads of security and IT and C-level executives)
Temporary bans on managers working in managerial positions
Designation of the Supervisory Officer
Venue "Fantadroms" (G. Zemgala gatve 74a, New Teika, office building HENRIHS) - get directions.
For further information, please contact the event coordinators by e-mail info@nordicsectecsummit.eu.
Summit Sponsors
Effectively, change is almost impossible without industry-wide collaboration, cooperation and consensus. /Simon Mainwaring/
The Summit was held in cooperation with
Business university Turība and in cooperation with the European Union ERASMUS+ cooperation project SECUREU, project number: 2021-1-LV01-KA220-HED-000023056. Read more here: http://Security.turiba.lv
Your opportunities for cooperation
In every event, big or small, the formula for success lies in the interaction between people, where ideas, strengths and opportunities combine to create ingenious creations that are talked about long after the event has taken place.
In 2024, around 290 people from 7 countries attended the event. Latvia was represented mainly by MIDs and top-level decision-makers from Top500 companies, as well as senior executives from various government organizations. This provides an opportunity to network and meet potential clients during the event.
If you also have a vision on how we can work together to make this industry event even more powerful, exciting and with its own unique added value, please fill in the application form below and we will get back to you within 1-2 working days.