Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. This will be followed by a welcome from the chairperson.
Shahid Raza, Professor of Cybersecurity, University of Glasgow & Research Director, RISE & Cybercampus Sweden
The Crucial Role of Information Security in the Wider Business Landscape
- Earning customer trust & business reputation – viewing security as a competitive differentiator
- Ensuring business continuity & financial security
- Data protection & compliance
Urmas Aamisepp, Head of Information Security, Epiroc
Evaluating Methods of Increasing Security Awareness Company-Wide
- Tactics to engage staff across your company on information security issues
- Debating the benefits of regular phishing training & testing
- Strategies to engage colleagues with tailored training available in different forms to accommodate a variety of learning styles
Sharon Larsson, CISO, Svenska Spel
Panel Discussion: Looking Forward: Information Security Trends in 2025
- A discussion of information security trends going into 2025 to inform priorities
- Strategies to stay one step ahead of hackers as technology advances & new risks develop
- Discerning outdated strategies & approaches to leave behind in 2024
Mikael Wigh, Head of Cybersecurity & Group IT Programs, ECCO
Jaromír Kuchynka, Head of Digital Compliance & Security, European LifeCare Group
Thor Milde, CISO, Sykehuspartner
Thomas Zakarias, CISO, DSV
Coffee Break & Networking
Open Forum Think Tank
AI Security
Shahid Raza, Professor of Cybersecurity, University of Glasgow & Research Director, RISE & Cybercampus Sweden
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Regulatory Management
- Supply Chain Security
- SOC
- IOT Security
- AI Security
- Network Security
- Email Security
Networking Lunch hosted by Snyk
A Deep Dive into Data Governance Amidst Evolving Regulations
- Identifying relevant data governance legislation & ensuring compliance
- Establishing internal data governance regulation to comply with company ethos
- Allocating data governance responsibilities within teams & auditing efficiency regularly
Tom Fischer Jensen, Head of Privacy & Security, Semler Gruppen
Leadership Approaches to Inspire Cyber Teams to Innovate
- Engaging with staff on an individual basis to understand & address concerns
- Leading by example & fostering a culture of honesty
- Celebrating innovation & creating a variety of opportunities for ideas sharing
Roger Ison-Haug, CISO, StormGeo
The Darwinism of the Public Sector: Establishing Information Security Without Support or Resources
- How to conduct IS work without a formal mandate
- Real-life examples of maximising limited resources
- Creative methods of implementing sustainable IS practices in organisations where it is not considered a priority
Quang Nguyen, CISO, Svenljunga Kommun
How Can CISO’s Position Information Security as a Business Enabler?
- Methods to boost business/IT conversations
- Employing business continuity programs to establish IS as a protector
- Taking a lead in the wider business & communicating strategically with boards & directors
Alexander Zhitenev, CISO, IFCO
Coffee Break & Networking
Workshop 4
Ransomware & Cyber Attacks
Shahid Raza, Professor of Cybersecurity, University of Glasgow & Research Director, RISE & Cybercampus Sweden
Workshop 5
Employee Training & Security Awareness
Göran Olofsson, Head of Innovation, Cybercampus Sweden
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Regulatory Management
- Supply Chain Security
- SOC
- IOT Security
- AI Security
- Network Security
- Email Security
Panel Discussion: Reconsidering Approaches to Building Innovative Cyber Teams
- Considering the benefits of widening points of entry to both junior & senior InfoSec roles
- Identifying candidates for upskilling & reskilling in order to curate an agile team with broad skills
- Methods of attracting top talent in a saturated landscape
Anders Jepsen, Head of Cyber Security, Energinet
Noora Hammar, Founder, Women4Cyber Finland
Bianca Buznean, President & Founder, Women4Cyber Denmark
Göran Olofsson, Head of Innovation, Cybercampus Sweden
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Peter Kruse, CISO, Clever
Mikael Wigh, Head of Cybersecurity & Group IT Programs, ECCO
Sami Sumkin, CISO, COR Group
Jani Räty, CISO, Nordic Investment Bank
Bo Rising, VP Security, TDC Net
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Workshop 6
Building Cyber Resilience
Göran Olofsson, Head of Innovation, Cybercampus Sweden
Workshop 7
Monitoring Emergency Privacy Threats
Shahid Raza, Professor of Cybersecurity, University of Glasgow & Research Director, RISE & Cybercampus Sweden
Networking
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Regulatory Management
- Supply Chain Security
- SOC
- IOT Security
- AI Security
- Network Security
- Email Security
Networking Lunch
Training & Building Awareness on Secure & Ethical Use of AI
- How to be an enabler, not a barrier, in the use of artificial intelligence within the organisation
- How to deliver effective training & awareness at the right level & at the right time within the organisation
- Common security concerns raised around generative AI
Siw Jakobsen, CISO, Eviny
Untangling the Complexities of Vulnerability Management
- Gathering intelligence on organisational cyber vulnerability
- Building & scaling technical controls & processes required by a modern vulnerability management program
- Ensuring the wider business adheres to implemented policies
Georgios Kryparos, CISO, Einride
Case Study: Nordic Investment Bank Building Resilience Against Uncertainty
- In 2022, Russia invaded Ukraine, bringing war to Europe
- NIB had to react & prepare for a new era of uncertainty
- Threat landscape, scenarios & playbooks provided tools to build resilience quickly
Jani Räty, CISO, Nordic Investment Bank
Panel Discussion: Cross-Functional Approaches to Building Emergency Response Plans
- Collaborating with other senior leaders to secure input when building emergency response plans
- Communicating responsibilities with clarity to enable an immediate response to cyber attack
- Reviewing emergency response plans to keep up with increasingly sophisticated threat
Thomas Zuliani, Global CISO, Arla Foods
Anders Thingholm, Head of Information Security, DANX Carousel
Maciej Wlodarczyk, CISO, Sanoma Media Finland
Thomas Koch, Director of Security, 3Shape