Assume Breach & Shield your Core

Calendar Icon

20/11/2024

Clock Icon

10:00-16:30

Map Pin Icon

Clarion Hotel Sign

November 20th - Hybrid Event

Agenda

Theme

Data Under Attack Icon

The Threat Landscape and Strategic Leadership

10.00

James Hughes (UK)
VP SE & Enterprise CTO EMEA
Rubrik
Opening Remarks

How to Prepare and Respond to the Threat Landscape in 2025

  • Cyber threat picture in recent years and what to expect from the future
  • Global Shifts and Geopolitical Dynamics in Cybersecurity
  • Emphasizing the role of leadership in navigating cyber challenges

10.25

Robert Mungenast
Group CISO
Electrolux
Stefano Goudarzi
Director Risk & Security
ICA Group

Cyber in the Boardroom

  • What emerging threats organisations are probably not thinking about but should
  • Board reporting and risks: Cybersecurity is never just a technology problem, it’s a people, processes and knowledge problem
  • Is your Strategy Plan compliant with the requirements, reduces the security gaps and responds to various relevant threats while ensuring everyone contributes their part of improving the organisation’s security posture

10.45

Cónal Hickey (IRE)
Vice President and Global Cyber Resilience Leader
Kyndryl

Insights for 2025 and Beyond: Understanding Modern Cyber Threats

  • Proactive Strategies for an Unpredictable Threat Landscape: A deep dive into recent trends and how cyber threats have evolved, informed by the latest findings
  • How global changes are expected to shape the next wave of cyber risks.
  • Why forward-thinking leadership and informed decision-making is critical to staying ahead of emerging cyber threats

11.05

James Tucker (US)
Head of CISO International
Zscaler

Zero Trust Architecture: From Concept to Reality, Adding Negative Trust to the Equation

  • Steps to implement Zero Trust principles to counter new digital business risks
  • The evolution of Zero Trust, and why Negative Trust is needed
  • Managing Zero Trust security models and the benefits of Deception Technology

11.25

Hugo Sigurdsson
Security Engineer Nordics
CrowdStrike

A Panda, a Spider and a Bear Walk into a Bar...

  • Insight into the evolving Threat Landscape from Nation state to eCrime
  • Understand how adversaries have rapidly accelerated time to impact
  • Why is Cloud the new hunting ground

11.40

Greg van der Gaast (UK)
Friendly Hacker

Key-Note: Better Security through Better Business

  • Why risk management isn’t sustainable
  • How quality management can reverse the security spiral
  • How security can define and streamline business process to increase the bottom line

12.00-13.00

Lunch

Theme

Threat Landscape Icon

Your Data is Under Attack - Be Prepared for the Worst Case Scenario

13.00

Andreas Bergqvist
CSO/CISO
BankID

Social Engineering - Combatting DeepFake and Misinformation Threats

  • Preparing your team for the perfect storm. Identifying and mitigating the risks of deep fakes and misinformation campaigns
  • Business Continuity and Disaster Recovery (BCDR) resilience in multiple-cyber-event scenarios
  • Counterintelligence training for teams in withstanding social engineering related attacks using behavioural science and exploiting human psychology and our emotions

13.15

Per Gustavsson
CISO Lead
Stratsys

Digital Transformation of Cybersecurity

  • Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML
  • Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots
  • Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response

13.30

Joshua Crumbaugh (US)
Ethical Hacker

Key-Note: Think Like a Hacker. Why AI Presents a Significant Threat

  • The attacker's perspective: Key insights on how to protect your human element in the age of AI
  • Understanding how cybercriminals operate has never been more essential for businesses and governments looking to defend themselves
  • Practical examples and demonstration on how to defend against advancements in AI including GenAI

13.50

Kristoffer Sjöström
CSO
SEB
Jørgen Floes
VP and DE, Resiliency & Security Lead
Kyndryl
Josefine Persson
NIS2 Project Lead for ICA
BTC

Prepare to Comply. DORA and NIS2 Directives are only 41 Days Away!

  • Explore the DORA and NIS2 directives and how to ensure operational resilience in the face of digital threats
  • The similarities and differences between the two new EU data regulations, affecting nearly every company despite their official scope
  • Effective strategies for DORA compliance and necessary steps your organization should take to achieve compliance and enhance security.

14.10

Andre Troskie (SA)
EMEA Field CISO
Veeam

Take Control in a World of Uncertainty

  • A cyber storm is gathering – what are the major factors that increase risk?
  • With increased risk comes increased expectations – what are the most important objectives and control drivers?
  • How can you build an efficient cyber strategy that results in better outcomes?

14.30-15.00

Networking Break

Theme

Human Centric Icon

Business Security Culture & Human Centric Strategies

15.00

Godwill N’Dulor
Senior Security Strategist
Fastly

Rebuilding Trust. Long-Term Impacts of Cyber Attacks on Business

  • Cyber attacks have a lasting impact on businesses
  • The true cost - beyond system downtime and availability to trust and reputation
  • Discover unique research insights and hear how 1500 global IT leaders navigate the evolving threat landscape in 2024

15.15

Andrew Rose (UK)
CISO
SoSafe

Tackling your Real Attack Surface - People

  • Attacks focused on People, not Technology is actually working pretty well
  • How to drive real adoption of secure behaviours
  • Different phases of building a strong security culture and how AI can help you in the transformation

15.30

Magnus Sletteng
Co-Founder Commvault Nordics, Principal Systems Engineer
Commvault
Magnus Ling
Storage Sales Specialist
HPE

From Attack to Recovery

  • Lessons learned from recent high-profile attacks
  • To pay or not to pay? In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services.
  • Recover from Ransomware: Whether you chose to pay the ransomware or not, how to treat your entire network as contaminated goods

15.45

Martijn Katerbarg
Compliance Engineer
Sectigo

Quantum Computing and 45 Day Limits on TLS Certificates

  • Upcoming PKI industry changes and impact of shorter certificate lifespans
  • Building robust Certificate Lifecycle Management strategies
  • Preparing for the inevitable. Adapting to emerging security challenges
  • Begin preparing for a shift to quantum-resistant security measure

16.00

Sharon Larsson
CISO
Svenska Spel
Andreas Bergqvist
CSO/CISO
BankID

Creating a Strong Business Security Culture

  • People Centric Strategies for 2025. Building a Culture of Awareness and Responsibility
  • Recognizing and Mitigating Insider Risks: Addressing Vulnerabilities from Within
  • The Importance of Modern and Resilient Cyber Leaders

16.25

End of Day

17.00

Strategy Talk Logo

Afterwork - Soho House Stockholm