Agenda

Presentations already confirmed include:


►Why Quantum Cryptography Isn’t Really a Technology Problem

Rune Espensen, Head of Information Security Office, Nordea

  • Why quantum computing is a society-wide challenge and how its impact extends far beyond purely technical concerns
  • Learn why preparation must start now and what early actions reduce long-term risk as quantum capabilities advance
  • Discover why technology isn’t the main barrier and what organisational, cultural, and strategic shifts are required to navigate the quantum transition effectively

►How Neste Built a Business-Driven Cyber Risk Program

Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste

  • Understand the key challenges Neste faced in managing cyber risk across a global, complex industrial and R&D environment
  • See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
  • Learn the lessons from Neste's experience that you can apply to mature your own organization's risk management program

►Cyber Leadership in an era of Dis-Cooperation

William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation

  • How global trade fragmentation impacts the community
  • How the "America First" Foreign Policy is leading to cyber instability
  • Actions the Cyber C-Suite can take

►Zero Trust in Action: Policy-Driven Access for Cyber Resilience

Sachin Loothra, Lead Solutions Architect, Telia

  • Rising cyber threats and their impact on organisational resilience
  • Policy-driven access as the foundation for Zero Trust implementation
  • How Zero Trust reduces breach impact and ensures business continuity

►Panel discussion: Building Resilient Cyber Risk Management

Simon Brady, Chairman, AKJ Associates (Moderator) 
Jay Prakash, CISO, Paf 
Ashish Bhadouria, Domain Engineering Manager - Security & Privacy,  Ingka Group

  • How can organisations turn risk appetite statements and metrics into practical decision-making tools?
  • With NIS2 and similar regulations, what does “appropriate and proportionate” really look like in practice — and how can risk management guide the response?
  • What makes for strong cyber risk metrics, and how can CISOs and CSOs give the Board real confidence in the organisation’s risk posture?
  • How does a resilience-first mindset shift culture — from blame and prevention to acceptance, preparedness, and recovery?

Education seminars