Two days
… with a host of keynotes, expert-level deep-dive workshops and an abundance of networking opportunities.
Learn about the importance of leveraging automation and levelling up your response time.
Migrating to SaaS
The benefits and how to do it with minimal fuss. And bridging the gap between operational and business outcomes.
MSSPs
For the MSSP, we have you covered too. Boost your efficiency, create business growth, and what we are doing to shape the MSSP landscape.
Conference participation is free of charge. Book your place and we look forward to seeing you there!
Meet the speakers
Overall Agenda
Here’s what you can initially expect from ThinkIn 2023. Check each tab for the subject that most interests you. We will be updating the agenda periodically so keep a look out for more sessions including keynotes.
Arrival and registration
08:30 – 10:00
The tech bar is open! Meet Logpoint experts or network with the Logpoint community. Breakfast and coffee is served.
Welcome to ThinkIn 2023
10:00 – 10:15
Logpoint’s CEO Jesper Zerlang welcomes you to ThinkIn 2023 and provides a preview of what is new with Logpoint and what you can expect over the coming days
Jesper Zerlang, CEO – Logpoint
Why NIS2 is a gamechanger
10:15 – 11:00
The NIS2 directive adopted by the European Parliament in December 2022 implements the most comprehensive cybersecurity regulation anywhere in the world. As Vice Chair of the European Parliament’s Special Committee dealing with Cybersecurity and rapporteur on NIS2, Morten is one of the founding fathers of the NIS2 directive. In the keynote he will share the political background for NIS2 and discuss the importance of protecting critical infrastructure at the company-, nation-, and EU-levels.
Morten Løkkegaard, Member of the European Parliament for the Danish Liberal party, Vice President of the Renew Europe Group, NIS2 rapporteur
Defining the evolving cyber security landscape with Logpoint
11:00 – 11:45
Join Logpoint’s CTO Christian Have who will be outlining Logpoint’s vison, direction and priorities over the coming year and how these will be defining the evolving cybersecurity landscape.
Christian will also be looking retrospectively over some of the key milestones from Logpoint of 2022 and how these are being utilized by organizations and MSSPs worldwide to detect, manage and respond to their cybersecurity challenges. Christian will be joined by Martha Chrisander, Head of Product Marketing
Christian Have, CTO – Logpoint
Martha Chrisander, Head of Product Marketing – Logpoint
Break
11:45 – 12:15
Cyber resilience in time of war – lessons from Ukraine
12:15 – 13:00
Ukraine is the first large-scale hybrid battlefield in history, with cyberattacks deployed by Russia in coordination with conventional warfare. But Russian cyberattacks began long before the Feb 24, 2022 invasion. For years Ukrainian infrastructure has been under constant attack, taking the need for Cyber Resilience to a whole new level. Ukrainian cyberdefenders must constantly evolve, but here are the key lessons so far…
Victor Zhora, Chief Digital Transformation Officer at the State Service of Special Communications and Information Protection of Ukraine
Introduction to breakout sessions & evening activities
13:00 – 13:15
Kim Rovsing
Lunch & Tech bar
13:00 – 14:00
Pre-dinner cocktails
18:00 – 19:00
Dinner & Entertainment
19:00
Arrival and Coffee
08:00 – 09:00
The tech bar is open! Meet Logpoint experts or network with the Logpoint community. Breakfast and coffee is served.
Cyber threats – and what to do about them?
09:00 – 09:45
Each day criminals and hackers working for foreign states try to penetrate systems and networks on a global scale. These attacks constitute a serious cyber threat, also to Danish organizations, and everyone should be aware of the risk this poses to their own business.
Mark Fiedel, Head of Cybersecurity Analysis, Danish Centre for Cybersecurity
A roundtable discussion about cybersecurity in the “grander scheme of things”
09:45 – 10:30
Join the fireside chat between Logpoint’s CEO Jesper Zerlang, Investment Director Jacob Frandsen of Summa Equity and a third special guest. Together with ThinkIn host Kim Rovsing they will discuss cybersecurity in the “grander scheme of things”: Why strategic cybersecurity resiliency is vital for Europe, and why technology-enabled transformation and cybersecurity is so crucial for our future.
Break
10:30 – 11:00
How do we talk and work with top management on cybersecurity
11:00 – 11:45
Listening to Henrik’s experiences and how he integrates cyber security into a business dialogue with the top management should be very inspirational. Get concrete inspiration on how you align and quantify cyber security initiatives to build a solid understanding of future returns from investments and risk mitigation at the top management level, as well as what is expected in terms of having control of the basics in the cyber security domain.
Henrik Løth Thiesen, Vestas
Introduction to breakout sessions & Wrap-up of plenum sessions
11:45 – 12:00
Lunch & Tech bar
12:00 – 13:00
End of ThinkIn 2023
17:00
Breakout Sessions
Logpoint Fundamentals are lab sessions including automation and our platforms, amongst others. For the MSSP, vital sessions around scale, growth, and what lies ahead. And we have sessions around the Threat Landscape and Deep Dive lab sessions. Take a look!
Tuesday 7th March
How to use dashboards
14:00 – 15:00
Dashboards. What are they and how can you leverage them?
Discover how to create and utilize dashboards to view your organization’s critical infrastructure. Take action from one central platform.
Matt Ellis, Customer Success Engineer
How to collect basic logs
15:00 – 16:00
How important are logs and how can you use them to your advantage?
Discover how to setup log collection on common endpoints and how to normalize the ingested logs.
Matt Ellis, Customer Success Engineer
How to use the query language for basic use cases
16:15 – 17:00
How to leverage query language?
Get a fundamental understanding of Logpoint query language and how to use it for solving end-to-end security use cases.
Matt Ellis, Customer Success Engineer
Wednesday 8th March
Using alerts to create incidents
13:00 – 14:15
How can you improve efficiency with alerts?
Increase your response exponentially with alerts. Discover how to set up critical alerts on specific triggers notifying your incident and response team.
Matt Ellis, Customer Success Engineer
Enriching logs
14:15 – 15:00
What is log enrichment and how does it help?
Discover how to ingest reports and CVE’s to enrich your logs.
Matt Ellis, Customer Success Engineer
Getting started with SOAR & Automation
15:15 – 16:15
How does SOAR technology level up your response?
Get introduced to the concepts and objectives of security automation with Logpoint SOAR. We will cover how to build foundational playbooks and how to get started with out of the box content.
Matt Ellis, Customer Success Engineer
Tuesday 7th March
MSSP Introduction and Building Service Revenue with Logpoint
14:00 – 15:00
How can you create business growth for the MSSP?
We discuss how you can take our security analytics platform and leverage it to create new valuable services that will generate new revenue streams from your clients.
Matthew Rhodes, Regional Director MSSP
The Value of Integration and Automation in an MSSP environment
15:00 – 16:00
How the MSSP can boost operational efficiency?
Vital for MSSP partners, get the best out of Logpoint by integrating with other platforms and automating regular processes. Plenty of tips and tricks for the MSSP.
Nicholai Rokuski, Solution Architect
Logpoint MSSP Roadmap
16:15 – 17:00
What are we doing to shape the MSSP landscape?
A must for the MSSP. Here we deliver the Logpoint MSSP Roadmap for the near future.
Edy Almer, Senior Product Manager
Wednesday 8th March
Improving your SIEM Threat Coverage and Operational Efficiency with Picus.
13:00 – 14:15
Join this session from cybersecurity vendor Picus who will be discussing how to improve your SIEM threat coverage and operational efficiency. Simon Huber – Senior Sales Engineer NEUR. Picus Security, Regional Sales Manager, Southern Europe at Picus Security.
Simon Huber, Senior Sales Engineer, NEUR, Picus Security
Simone Baccinelli, Regional Sales Manager, Southern Europe at Picus Security
Tuesday 7th March
Logpoint for BCS: Responding to threats in your SAP systems
14:00 – 15:00
How can you increase your coverage?
Discover how to increase security coverage by including SAP data in our security operation platform. Access concepts and use cases that level up your security coverage.
Christoph Aschauer, Director SAP Solutions
Faster detection and response with playbooks and automation
15:00 – 16:15
How can you automate processes and level up efficiency in your operations?
Discover how to automate SIEM use cases to vastly increasing efficiency and freeing you up to focus on critical cases. We’ll dive into decreasing threat response time with automated triage and analysis.
Doron Davidson, VP Global Services
Starting out with Logpoint SaaS
16:15 – 17:00
How do you migrate your existing Logpoint on-prem solution to SaaS?
Discover more about architecture, existing logs, ingestion and the benefits of using Logpoint’s SaaS solution.
Andreas Robertson, Product Manager
Wednesday 8th March
AgentX: Endpoint observability and security
13:00 – 14:15
What is AgentX, and how can it help your organization detect and respond to threats on endpoints?
Discover how Logpoint AgentX, transports logs and telemetry from endpoints (all servers, workstations, and applications) to the SIEM, and performs automated real-time investigation and remediation to threats.
Ulrik Rosendahl Jensen, Sales Engineer
Easily get logs from all your cloud applications
14:15 – 15:00
How can you install and configure the fetcher?
Logpoint’s Universal REST API Fetcher provides a generic interface to fetch logs from cloud sources via REST APIs.
Adrien Debosschere, Sales Engineer
How to utilize information security frameworks effectively
15:15 – 16:00
How can you bridge the gap between technical security and business outcomes?
The cybersecurity framework SANS 18 Cyber Security Controls (CIS18) is a helpful guideline to strengthen cybersecurity posture through tools, processes and automation. Discover how to drive conversations about security on a strategic level in your organization.
Jan Quach, Customer Success Director
Tuesday 7th March
Advanced Queries and Pattern finding: Part 1
14:00 – 15:00
Want to know how to utilize the different functions in Logpoint search query?
Increase the value of searches. Get real-life examples and pattern explanations. Discover the functionalities in search queries, perform forensics post attack or blue team tasks such as proactive threat hunting.
Nils Krumrey, Senior Sales Engineer
Advanced Queries and Pattern finding: Part 2
15.00 – 16:00
Want to know how to increase the value of searches?
A primer for performing forensics post attack or performing blue team tasks such as proactive threat hunting. Discover how to utilize the different functions in Logpoint search query for fast, efficient and effective results.
Nils Krumrey, Senior Sales Engineer
Deep Dive: Automating a Phishing investigation from A to Z
16:15 – 17:00
Playbook 101: What are the intricacies and uses of our playbooks? Build, action, and use.
Discover the best practices of any playbook design and how to set up new product integrations, run API action calls, perform SIEM queries. Build simple and effective playbook flows by utilizing automatic decision making based on threat intelligence risk scores. The session also highlights the special features SOAR has to offer such as global parameters, sub playbooks, reporting capabilities and much more.
Doron Davidson, VP Global Services
Wednesday 8th March
Doing more with what you have
14:15 – 15:00
Uncover network threats with advanced statistics
In this session, we will introduce algorithms to detect malicious network activity. We will demo in a lab botnet activity and show the theoretical and practical ways to detect and respond to these threats. At the end of the session, you will learn how to take the information and apply it in your own solution with your existing firewall solution.
Kennett Harpsoe, Senior Cyber Analyst
Threat Hunting with Logpoint: Part 1
15:15 – 16:15
How can you actively perform threat hunting, even while being attacked by a red team?
Discover the importance of designing, building and operating an inventory of security capabilities. It relies not only on building and operating the capability but needs constant testing to validate the efficiency and efficacy.
Edy Almer, Senior Product Manager
Threat Hunting with Logpoint: Part 2
16:15 – 17:00
How important is testing to boost efficiency and efficacy in threat hunting?
Designing, building and operating an inventory of security capabilities relies not only on building and operating the capability but needs constant testing to validate the efficiency and efficacy. Discover ways to actively perform threat hunting, including while being attacked by a red team.
Edy Almer, Senior Product Manager
ThinkIn 2021 Recap
To whet your appetite here’s a blast from the past with our favorite ThinkIn 2021 moments.