Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Regional ISO, LKQ Group
Aligning your Information Security Strategy with your Organisational Strategy in 2024
- Defining outcomes for information security strategies to ensure they contribute towards company objectives
- Working with all employees to incorporate information security measures into working practices
- Engaging with senior leaders to secure resources to strengthen cyber security policies
Carl-Göran Domeij, CISO, Billerud
Leveraging your Resilience Programme in Order to stay Compliant and Efficient in 2024
- What will be the key priorities keeping regulators up and night in 2024?
- A look at what needs to be on your organisational radar in 2024
- Understanding the key steps needed to delivery on regulatory compliance—How you get there and stay there
Dealing with Incident Response in the Cloud – Guidelines for Managing this Risk
- Developing a robust strategy to ensure and cover cloud security
- How to go about educating and raising awareness of the threat landscape in the cloud
- Drilling home the understanding of shared responsibility and ensuring that this is fully integrated into your organisational governance and policy framework
- What do CISOs need to know about cyber security, beyond the cloud?
Coffee break & networking
Workshop 1
Cloud vulnerabilities & rising costs
Workshop 2
Data breaches: threats to accessing personal & confidential information
Workshop 3
Mitigating malware & ransomware attacks
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
Implementing an Effective Cyber Security Awareness Programme Across your Organisation—What you Need to Know!
- Raising and escalating security concerns into working practices—What are the procedures?
- Increasing staff awareness of information security terminology and processes
- Tips on how to get your cyber security awareness programme started and maintained as a priority
Charlotta Ungerth, VP IT & Information Security, Viaplay Group
Working with Partner Organisations to Build Up Cyber Security within Supply Chains
- Implementing third party risk assessments when securing new vendor companies
- Regular reviews of data sharing frameworks with vendors to strengthen supply chain security measures
- Collaborating with suppliers to improve their security arrangements and reduce risk within supply chains
Teresia Willstedt, Head of Information Security and Business Continuity, MedMera Bank
A look at the Cyber Security Awareness Threat Landscape for 2024— How can you Stay Ahead to Mitigate Potential Risks
- Incorporating information security into decision-making processes to promote company-wide cyber resilience
- Developing accountability frameworks to determine responsibility for cyber security risk decisions
- Ensuring your organisation has an ongoing process of educating and training staff on cyber security
Jonas Rendahl, CISO, Aurobay
Measuring the Success of Security Measures to Identify Areas for Improvement
- Key advice on designing KPIs to determine the objectives for security measures
- Embedding security metrics programmes to evaluate trends in reported security incidents
- Using incident data to tackle gaps in security measures and inform cyber resilience strategies
Thomas Zuliani, Global CISO, Arla
Coffee break & networking
Workshop 4
Remote Working cyber security
Workshop 5
The rise of AI & the potential threats
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel Discussion: Working in Partnership to Monitor and Tackle External Threats
- Tools and resources to detect emerging security trends and inform future information security policies
- Developing interventions to prevent cyber security events escalating to become security breach incidents
- Engaging with staff to raise awareness of new external threats and how to report them
Gérard Duerrmeyer, VP Chief Architect & Security Officer, Norwegian Air Shuttle
Morning registration & breakfast
Informal networking over breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Gérard Duerrmeyer, VP Chief Architect & Security Officer, Norwegian Air Shuttle
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Workshop 6
Automation & control of sensitive information
Workshop 7
Social engineering attacks
Workshop 8
Mobile cyber security in the age of accelerated digital transformation
11:00-13.05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
Is it an Accident or Something more Sinister? How Resilient are you Against Insider Threats
- Looking inwards at the broad spectrum of Insider threats which are often overlooked for outside threats
- A look at cyber security platforms to address the myriad of insider threats
- Monitoring user based activity to prevent threats before they become a reality
Rune Skarphagen, CISO, Mitigram
How you as a CISO can Better Connect with your Board and Make the Case for Cyber security
- Influencing your organisations’ security approach and roadmap strategically
- Tips on how to connect with your board so you can steer the cyber security agenda
Roger Ison-Haug, CISO, StormGeo
Cyber Security vs Cyber Resilience: Operating Under Threat Whilst Mitigating Risk!
- How can cyber security and cyber resiliency work together to provide well-rounded, organisation-wide security
- How to ensure that solid security is maintained, as cyberattacks like malware, phishing, and ransomware can happen at any time and cause significant damage to your finances, productivity, and reputation
Incorporating Vulnerability Management into Leadership Strategies
Silvia Bondoc, Head of Information Security Auditing, Ericsson
Panel Discussion: A Deep Dive into the Cyber Threat Landscape – How the Past and Present will Inform your Decisions in 2024
- A look at current and past cyber security threats and trends helps to inform what future we need to prepare for
- What has 2023 taught us when it comes to cyber threats
- Understanding the latest technologies available and the power of human capability within the context of threat intelligence and building resilience for the long term – whatever the future may bring
Harri Susi, Head of Security Products & Technologies, Vaisala
Steven Brown, VP, Cyber Security & Resilience, Mastercard