Follow us:
Twitter
Facebook
Youtube
LinkedIn
Slideshare
Our Location
Contact us: phone +371 29 162 784 | e-mail: [email protected]

Home

DSS ITSEC 2019

The DSS ITSEC conference is annual vendor independent cybersecurity event that since 2010 has grown and strengthened ties between top ITsec professionals, leading IT companies and gov officials to ensure Baltic sea regions' security and raise cyber security awareness through all private and public sectors. Join thousand cybersecurity professionals to debate towards safer future!

The DSS ITSEC conference is annual vendor independent cybersecurity event that since 2010 has grown and strengthened ties between top ITsec professionals, leading IT companies and gov officials to ensure Baltic sea regions' security and raise cyber security awareness through all private and public sectors.

Slider

DSS News

Think Security First

DSS key specialization is system integration of the complex cyber security technological solutions and cyber security strategy development and its continuous development and maintenance.

DigitalEra-WSIS2019

Digital Era nominated for WSIS prize

With joy and pride we announce that the forum DIGITAL ERA is nominated in WSIS Process #wsis 2019 Awards! The forum is nominated in category Building confidence and security in use of ICTs.

AB.LV & IBM QRadar

Today, IBM QRadar security platform helps the ABLV security team consolidate and analyze data from more sources than was previously possible, providing staff with superior threat detection and a rich view of enterprise activity.

Digital Era 2019

The sixth annual Data Security and GDPR forum Digital Era

Our Partners

Our services

Security Intelligence (SIEM)

QRadar SIEM delivers the industry’s only SIEM system solution that gives security professionals the visibility they need to protect their networks. QRadar’s advanced SIEM technology protects IT assets from a growing landscape of advanced threats as well as meets current and emerging compliance mandates.

Data Security

One of today’s most rapidly evolving and widely deployed technologies is server desktop virtualization. Many organizations are already realizing the cost savings from implementing virtualized servers, and systems administrators love the ease of deployment and management for virtualized system. In addition, many organizations are evolving virtualized infrastructure into private clouds.

Identity Security

Today, every organization is faced with the complex challenge of efficiently validating user identity and enabling secure access. Identity thefts results in employees taking an average of 175 hours of work time to restore their identity following identity theft.

Cyber Riska Management

Information Security Governance is top-of-mind for organizations around the globe today. Defined, Information Security Governance (ISG) is a subset of Corporate Governance dealing with the policies and internal controls related to information resources and their security. It is mostly about international, regional and local compliance policies or state laws & regulations.

Network & Industrial Security

Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices, and SaaS delivery make securing the network a growing challenge. Traditional defenses such as Firewall, IPS, NAC alone are fragmented and don’t give full information and protection.

Mobile Security

Mobile devices are the primary personal communications and computing platform for business. However, they introduce cost, risk, and usability challenges that traditional mobile device management strategies cannot address.

Application Security

With the persistent nature of today’s attacks, applications can easily be compromised when security is not considered and scoped into each phase of the software development life cycle – from design to development to testing and ongoing maintenance. When you take a holistic approach to your application security, you greatly enhance your ability to produce and manage stable, secure applications.

Endpoint Security

Many international studies show that endpoints cause over 75% of all IT Security incidents. Configuration errors, vulnerability, stolen or lost computers or data, lack of access control and monitoring etc., together with disloyal employees or cybercriminals make troubles to business.

Success stories

ERGO & VASCO

To guarantee a safe log-on for every salesman to access the corporate internal database, ERGO had to search for a high-quality solution. “In collaboration with system integrator Data Security Solutions, we looked at different vendors and compared them to each other. Finally, we selected VASCO for its best price/performance ratio,” says Mr. Bairs.

Signet & MobileIron

“As a bank we are fully committed to ensuring the highest level of client confidentiality and data accuracy for our customers,” said Uldis Bielis, head of information security for Signet Bank Europe. “We needed the right enterprise mobility management (EMM) provider to help us maintain our high security standards on mobile devices, and that’s why we chose MobileIron,” he said.

AB.LV & IBM qRadar

Today, IBM QRadar security platform helps the ABLV security team consolidate and analyze data from more sources than was previously possible, providing staff with superior threat detection and a rich view of enterprise activity.