The Network Group Nordic Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 17th November 2025
08:30 - 09:15

Arrival, registration & breakfast networking

09:15 - 09:30

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. This will be followed by a welcome from the chairperson.

Lyzia van Iterson, Head of Security – Customer Applications, LKQ

09:30 - 10:05

How to Ask For a Budget & How to Use It Wisely (If You Get It)?

  • Building the business case for your budget
  • Prioritising the right security programs/projects
  • Hiring people vs buying tools and services and measuring your ROI

Georgios Kryparos, CISO, Einride

10:05 - 10:40

Utilising Cloud & AI Systems to Develop Proactive IT Operations

  • Rethink how to maintain stable and secure IT Operations
  • Engaging with staff to integrate cloud and AI systems into working processes
  • Key tips on using cloud and AI systems to enhance user experiences

Morten Eriksen, Head of IT Operations, DNB

10:40 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Hacking the Media: The PR Tactics of Cyber Criminals

Julius Nicklasson, Sales Engineer, Recorded Future

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

Think like an Attacker – Disrupt Attacks Before They Happen

Alex Welin, Senior Sales Engineer, XM Cyber

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

The Day-After Mindset – A Modern Cyber Resilience Approach

Michael Adjei, Director, Sales Engineering, Illumio

11:00 – 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • AI Cyber Security
  • Zero Trust
13:05 - 14:00

Networking Lunch

Stream 1 - Security Software
14:00 - 14:35

Transitioning Space Systems from Legacy to Cloud Systems

  • Why is space important?
  • Basic info on orbits and space systems
  • Known cyberattacks on space systems
  • How to secure space systems – transitioning to cloud

Mattias Wallén, CISO, Swedish Space Corporation

Stream 2 - Organisation-Wide Security
14:00 - 14:35

Designing Cyber Security Policies to Ensure Compliance with Regional Regulations

  • Regular reviews of information security processes to ensure compliance
  • Tools for submitting evidence of compliant processes to regulatory bodies
  • Procedures for raising concerns and addressing non-compliant cyber security policies

Ingegerd Wirehed, Information Security Coordinator & Advisor, Lund University

Stream 1 - Security Software
14:35 - 15:10

The Seven Keys to Business Transparency & Control in Access Management

  • How can organizations effectively implement, manage, and measure their IGA?
  • How does IGA connect to Zero Trust?
  • And how can identity threat and response maturity be strengthened?

Stefan van Gansbeke , Director Risk, Security & Legal, Christelijke Mutualiteit

Stream 2 - Organisation-Wide Security
14:35 - 15:10

Aligning Information Security & Wider Company Objectives to Achieve Business Growth

  • Collecting evidence to demonstrate how investing in security supports business growth
  • Preparing business plans to secure additional resources for information security strategies
  • Key tips on utilising security credentials as a competitive advantage

Jesper Alang-Rasmussen, Head of Information Security Risk, DSV

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

The AI Arms Race: Good AI vs. Bad AI

Daniel Qvint, Enterprise Sales Engineer, Abnormal AI

 

15:50 - 16:15
Networking
16:15 - 16:40

Open Forum Think Tank

Risk Platforms

Thomas Møldrup-Koch, Security Director, 3Shape

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • AI Cyber Security
  • Zero Trust
17:05 - 17:50

Panel Discussion: Utilising AI Tools to Expand Information Security Capabilities

  • Implementing AI systems to identify anomalies in information security data and tackle increasingly sophisticated cyber threats
  • Incorporating AI tools to recognise and monitor emerging trends in cyber security threat data
  • Evaluating the ethics of using AI to take over information security staff roles and responsibilities

Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Professor Christian Gehrmann, Professor, Secure & Networked Systems, Lund University
Katarina Boustedt, Research Project Manager, RISE

19:00
Networking Dinner & Drinks Reception
Tuesday 18th November 2025
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: Security Governance

Oliver Hammarstig, CTO/CISO, SETEK Group

Roundtable 2: Business & Information Security

 Christoffer Åkesson, CISO, Getinge

Roundtable 3: Regulatory Compliance

Alexander Ahlstedt, ISO/Security Coordinator, Braathens

Roundtable 4: Incident Response

Goran Radosavljevic, Cyber Security Lead, Swiss Re

Roundtable 5: Security Auditing

Silvia Bondoc, Head of Information Security Auditing, Ericsson

Roundtable 6: Security Culture

Roger Ison-Haug, CISO, StormGeo

10:10 - 10:45

Roundtable Wrap-up

Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Open Forum Think Tank

Post Quantum Cryptography

Chanderjeet Rai, Cyber Security Manager, H&M

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Beyond the Zero Day limits! Pre-emptive Security in a Reactive World

Jose Canelada, VP Solutions Architects, EMEA, Infoblox

12:15 - 12:40
Networking
12.40 - 13.05

Open Forum Think Tank

Choosing External SOC Suppliers

Ola Sjögren, Lead Enterprise IT Security Architect, NCC

11:00-13.05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • AI Cyber Security
  • Zero Trust
13.05 - 14.00

Networking Lunch

14:00 - 14:35

Implementing Systems Thinking & Generative AI for Effective Cyber Security Measures

  • Evaluating cyber security measures to identify where generative AI can increase operational efficiency
  • Working with software providers to select generative AI tools that support business needs
  • Embedding systems thinking approaches into working processes to increase cyber security team productivity

Karthik Muthukrishnan, Head of Product Security & Privacy, Vaisala

14:35 - 15:25

Panel Discussion: Developing Security Incident Response Plans to Protect Company Assets

  • Incident response scenario training exercises to make sure cyber security team members all understand their roles to manage the impact of cyber attacks
  • Engaging with all staff to recognise cyber threats and how to appropriately raise security concerns
  • Evaluating aspects of ethical usage of AI in cyber security as part of developing security incident response plans

Tom John Fischer Jensen, Head of Privacy & Security, Semler
Goran Radosavljevic, Cyber Security Lead, Swiss Re
Ingegerd Wirehed, Information Security Coordinator & Advisor, Lund University

15:25 - 15:30
Closing Remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

COPENHAGEN, DENMARK
16-17 November, 2026

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy