Agenda
Presentations already confirmed include:
►Why Quantum Cryptography Isn’t Really a Technology Problem
Rune Espensen, Head of Information Security Office, Nordea
- Why quantum computing is a society-wide challenge and how its impact extends far beyond purely technical concerns
- Learn why preparation must start now and what early actions reduce long-term risk as quantum capabilities advance
- Discover why technology isn’t the main barrier and what organisational, cultural, and strategic shifts are required to navigate the quantum transition effectively
►How Neste Built a Business-Driven Cyber Risk Program
Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste
- Understand the key challenges Neste faced in managing cyber risk across a global, complex industrial and R&D environment
- See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
- Learn the lessons from Neste's experience that you can apply to mature your own organization's risk management program
►Cyber Leadership in an era of Dis-Cooperation
William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation
- How global trade fragmentation impacts the community
- How the "America First" Foreign Policy is leading to cyber instability
- Actions the Cyber C-Suite can take
►Zero Trust in Action: Policy-Driven Access for Cyber Resilience
Sachin Loothra, Lead Solutions Architect, Telia
- Rising cyber threats and their impact on organisational resilience
- Policy-driven access as the foundation for Zero Trust implementation
- How Zero Trust reduces breach impact and ensures business continuity
►Panel discussion: Building Resilient Cyber Risk Management
Simon Brady, Chairman, AKJ Associates (Moderator)
Jay Prakash, CISO, Paf
Ashish Bhadouria, Domain Engineering Manager - Security & Privacy, Ingka Group
Jeevan Singh, Head of Cyber Security & Common Infrastructure Services, Nokia Technology Standards
Kari Keinänen, CISO, Lounea Oyj
- How can organisations turn risk appetite statements and metrics into practical decision-making tools?
- With NIS2 and similar regulations, what does “appropriate and proportionate” really look like in practice — and how can risk management guide the response?
- What makes for strong cyber risk metrics, and how can CISOs and CSOs give the Board real confidence in the organisation’s risk posture?
- How does a resilience-first mindset shift culture — from blame and prevention to acceptance, preparedness, and recovery?
►What lies ahead in 2026?
Samuli Bergström, Director, Head of CSIRT at Traficom, NCSC-FI
- What Finland’s cyber-threat landscape looks like right now and we are navigating
- What attacks are organisations are dealing with right now?
- Stay ahead: Upcoming threat trends and how to be prepared
►AI Impact in Threat Intelligence: What's Changed in Our Life?
Samet Sazak, Senior Solutions Engineer, SOCRadar
- How AI and large language models have changed day-to-day threat intelligence work
- Practical examples of how defenders use AI to analyse underground forums, detect brand abuse, and prioritize real risk faster.
- How threat actors abuse AI, including tools like WormGPT, AI-generated phishing, and automated reconnaissance
- What still requires human judgment in threat intelligence, and how to avoid over-trusting AI-driven insights
►The Future of Cyber Resilience: Securing the Exposed Edge of Critical Infrastructure
Martin Solang, Sales Director Nordics, Censys & Jonas Gyllenhammar, Sr. Sales Engineer, Censys
- Growing attack surface: Connectivity expands exposure across services, ports, and unmanaged assets
- Internet exposure insights: What Censys data reveals about today’s misconfiguration trends
- Attacker speed: How adversaries find and exploit exposures within minutes
- Proactive resilience: Using continuous ASM to secure the exposed edge early
►Unmasking Fraud. The Lifecycle and Operational Dynamics of Identity Deception
Marcin Zimny, Senior Principal Solution Architect, PingIdentity
- In this session, you will learn how identity deception like synthetic identities, new account fraud, and AI driven account takeovers is reshaping the fraud landscape
- We will walk through the full lifecycle of these attacks and show how they exploit operational blind spots in traditional fraud defences. You will see why legacy and siloed tools fall short, and how a modern identity first approach can detect threats in real time, adapt access journeys based on risk, and stop fraud without disrupting legitimate users.
- If you are looking to reduce losses and rebuild digital trust, this session will give you a practical blueprint to do just that
►Privileged Identities: The Front Door of Modern Cyber Attacks
Scott Shields, Enterprise Sales Engineer, Delinea
- Why privileged identities are the gateway for today’s advanced threats
- Beyond vaulting – learn how to eliminate standing privilege and naturally build cyber resilience
- How does Identity Security help evolving regulations like NIS2 and DORA
- Why unified, platform-based PAM strategies are key to sustaining both security and speed
►Identity is the New Perimeter; Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack
Sami Laurila, GTM Leader Northern Europe Identity & AI Technology, Rubrik
- Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate
- Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption
- Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events
Education seminars
Utilise your Threat Intelligence to Improve your Security Posture, Continuously!
Magnus Lundgren, Sales Director Nordics, Filigran
Attendees will learn:
- Don't just collect threat intel feeds - drive context and priority from it and align it with your organisation’s critical assets and business risks
- Break down silos - orchestrating intel sharing across SOC, CTI, vulnerability management, and leadership, enabling faster, better-informed decisions
- Establish a continuous feedback loop - between threat intelligence, detection engineering, and security validation to drive measurable improvements in security posture
- Leverage Filigran’s open, collaborative intelligence platform to operationalise these practices at scale, without locking yourself into rigid, black-box tooling