Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Head of Security – Customer Applications, LKQ
How to Ask For a Budget & How to Use It Wisely (If You Get It)?
- Building the business case for your budget
- Prioritising the right security programs/projects
- Hiring people vs buying tools and services and measuring your ROI
Georgios Kryparos, CISO, Einride
Utilising Cloud & AI Systems to Develop Proactive IT Operations
- Rethink how to maintain stable and secure IT Operations
- Engaging with staff to integrate cloud and AI systems into working processes
- Key tips on using cloud and AI systems to enhance user experiences
Morten Eriksen, Head of IT Operations, DNB
Coffee Break & Networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
Transitioning Space Systems from Legacy to Cloud Systems
- Why is space important?
- Basic info on orbits and space systems
- Known cyberattacks on space systems
- How to secure space systems – transitioning to cloud
Mattias Wallén, CISO, Swedish Space Corporation
Designing Cyber Security Policies to Ensure Compliance with Regional Regulations
- Regular reviews of information security processes to ensure compliance
- Tools for submitting evidence of compliant processes to regulatory bodies
- Procedures for raising concerns and addressing non-compliant cyber security policies
Ingegerd Wirehed, Information Security Coordinator & Advisor, Lund University
The Seven Keys to Business Transparency & Control in Access Management
- How can organizations effectively implement, manage, and measure their IGA?
- How does IGA connect to Zero Trust?
- And how can identity threat and response maturity be strengthened?
Stefan van Gansbeke , Director Risk, Security & Legal, Christelijke Mutualiteit
Aligning Information Security & Wider Company Objectives to Achieve Business Growth
- Collecting evidence to demonstrate how investing in security supports business growth
- Preparing business plans to secure additional resources for information security strategies
- Key tips on utilising security credentials as a competitive advantage
Jesper Alang-Rasmussen, Head of Information Security Risk, DSV
Coffee Break & Networking
Open Forum Think Tank
Risk Platforms
Thomas Møldrup-Koch, Security Director, 3Shape
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel Discussion: Utilising AI Tools to Expand Information Security Capabilities
- Implementing AI systems to identify anomalies in information security data and tackle increasingly sophisticated cyber threats
- Incorporating AI tools to recognise and monitor emerging trends in cyber security threat data
- Evaluating the ethics of using AI to take over information security staff roles and responsibilities
Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Professor Christian Gehrmann, Professor, Secure & Networked Systems, Lund University
Katarina Boustedt, Research Project Manager, RISE
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Oliver Hammarstig, CTO/CISO, SETEK Group
Christoffer Åkesson, CISO, Getinge
Alexander Ahlstedt, ISO/Security Coordinator, Braathens
Goran Radosavljevic, Cyber Security Lead, Swiss Re
Silvia Bondoc, Head of Information Security Auditing, Ericsson
Roger Ison-Haug, CISO, StormGeo
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Open Forum Think Tank
Post Quantum Cryptography
Chanderjeet Rai, Cyber Security Manager, H&M
Open Forum Think Tank
Choosing External SOC Suppliers
Ola Sjögren, Lead Enterprise IT Security Architect, NCC
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
Implementing Systems Thinking & Generative AI for Effective Cyber Security Measures
- Evaluating cyber security measures to identify where generative AI can increase operational efficiency
- Working with software providers to select generative AI tools that support business needs
- Embedding systems thinking approaches into working processes to increase cyber security team productivity
Karthik Muthukrishnan, Head of Product Security & Privacy, Vaisala
Panel Discussion: Developing Security Incident Response Plans to Protect Company Assets
- Incident response scenario training exercises to make sure cyber security team members all understand their roles to manage the impact of cyber attacks
- Engaging with all staff to recognise cyber threats and how to appropriately raise security concerns
- Evaluating aspects of ethical usage of AI in cyber security as part of developing security incident response plans
Tom John Fischer Jensen, Head of Privacy & Security, Semler
Goran Radosavljevic, Cyber Security Lead, Swiss Re
Ingegerd Wirehed, Information Security Coordinator & Advisor, Lund University





