Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Regional ISO, LKQ Group
Aligning your Information Security Strategy with your Organisational Strategy in 2024
- Define outcomes for information security strategies to ensure they contribute towards company objectives.
- Leverage senior leadership and board support to achieve the desired cyber security risk appetite.
- Build a collaborative security culture to partner with stakeholders and engage with all employees in executing the security plan
- Measure and monitor the effectiveness of the implemented information security strategy
Stefan Van Gansbeke, MC – Director Risk, Security & Legal – CISO, Christelijke Mutualiteit
Assessing the 2024 Security Landscape to Improve Security Posture
- What will be the key priorities keeping CISOs up at night in 2024?
- A look at what needs to be on your organisational radar in 2024
- Understanding the key steps needed to delivery on regulatory compliance—How you get there and stay there
Hasan Rahman, Chief Security Advisor, Microsoft
Coffee break & networking
Open Forum Think Tank
Vulnerability Management
Gérard Duerrmeyer, CISO, Norwegian Air Shuttle
Open Forum Think Tank
Third Party Risk Assessments
Karsten Mochau Laursen, ISO, Billund Lufthavn
Open Forum Think Tank
Incident Response
Karsten Mochau Laursen, ISO, Billund Lufthavn
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
A look at the Cyber Security Awareness Threat Landscape for 2024— How can you Stay Ahead to Mitigate Potential Risks
- Incorporating information security into decision-making processes to promote company-wide cyber resilience
- Developing accountability frameworks to determine responsibility for cyber security risk decisions
- Ensuring your organisation has an ongoing process of educating and training staff on cyber security
Jonas Rendahl, CISO, Aurobay
Working with Partner Organisations to Build Up Cyber Security within Supply Chains
- Implementing third party risk assessments when securing new vendor companies
- Regular reviews of data sharing frameworks with vendors to strengthen supply chain security measures
- Collaborating with suppliers to improve their security arrangements and reduce risk within supply chains
Teresia Willstedt, Head of Information Security and Business Continuity, MedMera Bank
Measuring the Success of Security Measures to Identify Areas for Improvement
- Key advice on designing KPIs to determine the objectives for security measures
- Embedding security metrics programmes to evaluate trends in reported security incidents
- Using incident data to tackle gaps in security measures and inform cyber resilience strategies
Thomas Zuliani, Global CISO, Arla
Coffee break & networking
Open Forum Think Tank
Data Privacy
Tim Ottens, Senior Data Scientist, PostNL
Open Forum Think Tank
The rise of AI & the Potential Threats
Tim Ottens, Senior Data Scientist, PostNL
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel Discussion: Working in Partnership to Monitor and Tackle External Threats
- Tools and resources to detect emerging security trends and inform future information security policies
- Developing interventions to prevent cyber security events escalating to become security breach incidents
- Engaging with staff to raise awareness of new external threats and how to report them
Gérard Duerrmeyer, CISO, Norwegian Air Shuttle
Jan Kominek, Wholesale Banking CISO Office, ING Bank
Petri Ala-Annala, CISO, Nobia
Morning registration & breakfast
Informal networking over breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Amine Menaa, Nordic Cyber Engagement Leader, Aon
Jan Kominek, CISO, ING Bank
Cecilie Brudager, Compliance Director, Novo Nordisk
Gérard Duerrmeyer, CISO, Norwegian Air Shuttle
Eri Kejser, CISO, FORCE Technology
Dusan Tomic, Head of Security Product, United Nations
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Open Forum Think Tank
Security Network Monitoring
Johan Olsson, Head of Enterprise Architecture, Ambu
Open Forum Think Tank
Application Security
Dusan Tomic, Head of Security Product, United Nations
Open Forum Think Tank
Access Management
Dusan Tomic, Head of Security Product, United Nations
11:00-13.05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking Lunch
Is it an Accident or Something more Sinister? How Resilient are you Against Insider Threats
- Looking inwards at the broad spectrum of Insider threats which are often overlooked for outside threats
- A look at cyber security platforms to address the myriad of insider threats
- Monitoring user based activity to prevent threats before they become a reality
Rune Skarphagen, CISO, Mitigram
How you as a CISO can Better Connect with your Board and Make the Case for Cyber security
- Influencing your organisations’ security approach and roadmap strategically
- Tips on how to connect with your board so you can steer the cyber security agenda
Roger Ison-Haug, CISO, StormGeo
Cyber Security vs Cyber Resilience: Operating Under Threat Whilst Mitigating Risk
- How can cyber security and cyber resiliency work together to provide well-rounded, organisation-wide security
- How to ensure that solid security is maintained, as cyberattacks like malware, phishing, and ransomware can happen at any time and cause significant damage to your finances, productivity, and reputation
Ogechi Obaegbulam, Head of Global Product Security, Vizrt
Utilising Security Audits to Manage Strategic Risks
- Establishing data sharing guidelines to deliver comprehensive security audits
- Tools to identify and monitor trends from security audit results
- Guidance on communicating findings of audits to senior leaders and secure additional security resources
Roland Heickerö, Corporate Senior Auditor, Ericsson
Panel Discussion: A Deep Dive into the Cyber Threat Landscape – How the Past and Present will Inform your Decisions in 2024
- A look at current and past cyber security threats and trends helps to inform what future we need to prepare for
- What has 2023 taught us when it comes to cyber threats
- Understanding the latest technologies available and the power of human capability within the context of threat intelligence and building resilience for the long term – whatever the future may bring
Harri Susi, Head of Security, Products & Technologies, Vaisala
Petri Ala-Annala, CISO, Nobia