Skip to main content

Infosecurity Europe 2013: Hall of Fame Shlomo Kramer & Mikko Hypponen

London, 23rd April 2013 - For the last 5 years the medal of honour of the information security world has been presented to speakers of high renown with the ‘Hall of Fame’ at Infosecurity Europe. Voted for by fellow industry professionals the recipients of this most prestigious honour stand at the vanguard of the technological age and this year both Shlomo Kramer and Mikko Hypponen will be presented with the honour on Wednesday 24 Apr 2013 at 10:00 - 11:00 in the Keynote Theatre at Infosecurity Europe, Earl’s Court, London.

Shlomo Kramer is the CEO and a founder of Imperva (NYSE:IMPV), prior to that he co-founded Check Point Software Technologies Ltd. in 1993 (NASDAQ:CHKP). Kramer has participated as an early investor and board member in a number of security and enterprise software companies including Palo Alto Networks (NYSE:PANW), Trusteer, WatchDox, Lacoon Security, TopSpin Security, SkyFence, Worklight, Incapsula and SumoLogic.

Shlomo Kramer commented “I am delighted to have been chosen by Infosecurity for the “hall of fame” in 2013 – it’s a great honour to be recognised for the work that I have done in the IT security industry as a founder of companies such as Check Point and Imperva. I love nothing more than creating and fostering successful enterprise IT- focused businesses and will continue to put my energy into combating the ever increasing onslaught from the cyber-criminal world.”

Mikko Hypponen is the Chief Research Officer of F-Secure in Finland. He has been working with computer security for over 20 years and has fought the biggest virus outbreaks in the net.  He's also a columnist for the New York Times, Wired, CNN and BBC. His TED Talk on computer security has been seen by over a million people and has been translated to over 35 languages. Mr. Hypponen sits in the advisory boards of the ISF and the Lifeboat foundation.

"I've worked in the industry for 22 years and haven't had a boring day yet. I'm honoured to be inducted to the hall of fame", commented Mikko Hypponen. "The enemy is changing all the time so we must keep up."

Previous speakers have included some of the world’s leading thinkers in information security including Professor Fred Piper, Professor Howard Schmidt, Bruce Schneier, Whitfield Diffie, Paul Dorey, Dan Kaminsky, Phil Zimmerman, Lord Erroll, Eugene Kaspersky, Charlie McMurdie, Stephen Bonner and Ed Gibson. To view all previous speakers, along with a short biography, you can visit the Infosecurity website:

The 2013 Hall of Fame will be conducted in the Keynote theatre where both Shlomo and Mikko Hypponen will join Professor Fred Piper in a panel chaired by Raj Samani from the CSA which will address other industry professionals in what always proves to be a compelling and exhilarating event.
The speakers inducted into the Hall of Fame have met the following criteria:
  • Be an internationally recognised and respected Information Security practitioner or advocate 
  • Have made a clear and long-term contribution to the advancement of Information Security 
  • Have provided intellectual or practical input that has shifted the advancement of Information Security 
  • Be an engaging and revolutionary thought leader in Information Security 
The Hall of Fame has proven to be the highlight of previous shows and this year is no different. Setting the standard for other industry professionals and defining contemporary issues, the Hall of Fame speakers aim to challenge conventional thought with a mix of pragmatism and provocation. It really is the must see event of the year.


Popular posts from this blog

2020: Machine Learning, Post Quantum Crypto & Zero Trust

Welcome to a digital identity project in 2020! You'll be expected to have a plan for post-quantum cryptography.  Your network will be littered with "zero trust" buzz words, that will make you suspect everyone, everything and every transaction.  Add to that, “machines” will be learning everything, from how you like your coffee, through to every network, authentication and authorisation decision. OK, are you ready?

Machine Learning I'm not going to do an entire blog on machine learning (ML) and artificial intelligence (AI).  Firstly I'm not qualified enough on the topic and secondly I want to focus on the security implications.  Needless to say, within 3 years, most organisations will have relatively experienced teams who are handling big data capture from an and identity, access management and network perspective.

That data will be being fed into ML platforms, either on-premise, or via cloud services.  Leveraging either structured or unstructured learning, data fr…

Customer Data: Convenience versus Security

Organisations in both the public and private sector are initiating programmes of work to convert previously physical or offline services, into more digital, on line and automated offerings.  This could include things like automated car tax purchase, through to insurance policy management and electricity meter reading submission and reporting.

Digitization versus Security

This move towards a more on line user experience, brings together several differing forces.  Firstly the driver for end user convenience and service improvement, against the requirements of data security and privacy.  Which should win?  There clearly needs to be a balance of security against service improvement.  Excessive and prohibitive security controls would result in a complex and often poor user experience, ultimately resulting in fewer users.  On the other hand, poorly defined security architectures, lead to data loss, with the impact for personal exposure and brand damage.

Top 5 Security Predictions for 2016

It's that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin.  This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on:

Customer Identity ManagementThe start of IoT security awarenessReduced Passwords on MobileConsumer PrivacyCloud Single Sign On
In retrospect, a pretty accurate and ongoing list.  Consumer related identity (cIAM) is hot on most organisation's lips, and whilst the password hasn't died (and probably never will) there are more people using things like swipe login and finger print authentication than ever before.

But what will 2016 bring?

Mobile Payments to be Default for Consumers

2015 has seen the rise in things like Apple Pay and Samsung Pay hitting the consumer high street with venom.  Many retail outlets now provide the ability to "tap and pay" using a mobile device, with many banks also offer…