How to Prepare and Respond to the Threat Landscape in 2025
Cyber threat picture in recent years and what to expect from the future
Global Shifts and Geopolitical Dynamics in Cybersecurity
Emphasizing the role of leadership in navigating cyber challenges
10.25
Robert Mungenast
Group CISO
Electrolux
Stefano Goudarzi
Director Risk & Security
ICA Group
Cyber in the Boardroom
What emerging threats organisations are probably not thinking about but should
Board reporting and risks: Cybersecurity is never just a technology problem, it’s a people, processes and knowledge problem
Is your Strategy Plan compliant with the requirements, reduces the security gaps and responds to various relevant threats while ensuring everyone contributes their part of improving the organisation’s security posture
10.45
Cónal Hickey (IRE)
Vice President and Global Cyber Resilience Leader
Kyndryl
Insights for 2025 and Beyond: Understanding Modern Cyber Threats
Proactive Strategies for an Unpredictable Threat Landscape: A deep dive into recent trends and how cyber threats have evolved, informed by the latest findings
How global changes are expected to shape the next wave of cyber risks.
Why forward-thinking leadership and informed decision-making is critical to staying ahead of emerging cyber threats
11.05
James Tucker (US)
Head of CISO International
Zscaler
Zero Trust Architecture: From Concept to Reality, Adding Negative Trust to the Equation
Steps to implement Zero Trust principles to counter new digital business risks
The evolution of Zero Trust, and why Negative Trust is needed
Managing Zero Trust security models and the benefits of Deception Technology
11.25
Hugo Sigurdsson
Security Engineer Nordics
CrowdStrike
A Panda, a Spider and a Bear Walk into a Bar...
Insight into the evolving Threat Landscape from Nation state to eCrime
Understand how adversaries have rapidly accelerated time to impact
Why is Cloud the new hunting ground
11.40
Greg van der Gaast (UK)
Friendly Hacker
Key-Note: Better Security through Better Business
Why risk management isn’t sustainable
How quality management can reverse the security spiral
How security can define and streamline business process to increase the bottom line
12.00-13.00
Lunch
Theme
Your Data is Under Attack - Be Prepared for the Worst Case Scenario
13.00
Andreas Bergqvist
CSO/CISO
BankID
Social Engineering - Combatting DeepFake and Misinformation Threats
Preparing your team for the perfect storm. Identifying and mitigating the risks of deep fakes and misinformation campaigns
Business Continuity and Disaster Recovery (BCDR) resilience in multiple-cyber-event scenarios
Counterintelligence training for teams in withstanding social engineering related attacks using behavioural science and exploiting human psychology and our emotions
13.15
Per Gustavsson
CISO Lead
Stratsys
Digital Transformation of Cybersecurity
Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML
Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots
Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response
13.30
Joshua Crumbaugh (US)
Ethical Hacker
Key-Note: Think Like a Hacker. Why AI Presents a Significant Threat
The attacker's perspective: Key insights on how to protect your human element in the age of AI
Understanding how cybercriminals operate has never been more essential for businesses and governments looking to defend themselves
Practical examples and demonstration on how to defend against advancements in AI including GenAI
13.50
Kristoffer Sjöström
CSO
SEB
Jørgen Floes
VP and DE, Resiliency & Security Lead
Kyndryl
Josefine Persson
NIS2 Project Lead for ICA
BTC
Prepare to Comply. DORA and NIS2 Directives are only 41 Days Away!
Explore the DORA and NIS2 directives and how to ensure operational resilience in the face of digital threats
The similarities and differences between the two new EU data regulations, affecting nearly every company despite their official scope
Effective strategies for DORA compliance and necessary steps your organization should take to achieve compliance and enhance security.
14.10
Andre Troskie (SA)
EMEA Field CISO
Veeam
Take Control in a World of Uncertainty
A cyber storm is gathering – what are the major factors that increase risk?
With increased risk comes increased expectations – what are the most important objectives and control drivers?
How can you build an efficient cyber strategy that results in better outcomes?
14.30-15.00
Networking Break
Theme
Business Security Culture & Human Centric Strategies
15.00
Godwill N’Dulor
Senior Security Strategist
Fastly
Rebuilding Trust. Long-Term Impacts of Cyber Attacks on Business
Cyber attacks have a lasting impact on businesses
The true cost - beyond system downtime and availability to trust and reputation
Discover unique research insights and hear how 1500 global IT leaders navigate the evolving threat landscape in 2024
15.15
Andrew Rose (UK)
CISO
SoSafe
Tackling your Real Attack Surface - People
Attacks focused on People, not Technology is actually working pretty well
How to drive real adoption of secure behaviours
Different phases of building a strong security culture and how AI can help you in the transformation
15.30
Magnus Sletteng
Co-Founder Commvault Nordics, Principal Systems Engineer
Commvault
Magnus Ling
Storage Sales Specialist
HPE
From Attack to Recovery
Lessons learned from recent high-profile attacks
To pay or not to pay? In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services.
Recover from Ransomware: Whether you chose to pay the ransomware or not, how to treat your entire network as contaminated goods
15.45
Martijn Katerbarg
Compliance Engineer
Sectigo
Quantum Computing and 45 Day Limits on TLS Certificates
Upcoming PKI industry changes and impact of shorter certificate lifespans
Building robust Certificate Lifecycle Management strategies
Preparing for the inevitable. Adapting to emerging security challenges
Begin preparing for a shift to quantum-resistant security measure
16.00
Sharon Larsson
CISO
Svenska Spel
Andreas Bergqvist
CSO/CISO
BankID
Creating a Strong Business Security Culture
People Centric Strategies for 2025. Building a Culture of Awareness and Responsibility
Recognizing and Mitigating Insider Risks: Addressing Vulnerabilities from Within
The Importance of Modern and Resilient Cyber Leaders