Agenda

Presentations already confirmed include:


►Why Quantum Cryptography Isn’t Really a Technology Problem

Rune Espensen, Head of Information Security Office, Nordea

  • Why quantum computing is a society-wide challenge and how its impact extends far beyond purely technical concerns
  • Learn why preparation must start now and what early actions reduce long-term risk as quantum capabilities advance
  • Discover why technology isn’t the main barrier and what organisational, cultural, and strategic shifts are required to navigate the quantum transition effectively

►How Neste Built a Business-Driven Cyber Risk Program

Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste

  • Understand the key challenges Neste faced in managing cyber risk across a global, complex industrial and R&D environment
  • See the step-by-step journey of transforming their cyber program into one that is business-driven and risk-informed
  • Learn the lessons from Neste's experience that you can apply to mature your own organization's risk management program

►Cyber Leadership in an era of Dis-Cooperation

William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation

  • How global trade fragmentation impacts the community
  • How the "America First" Foreign Policy is leading to cyber instability
  • Actions the Cyber C-Suite can take

►Zero Trust in Action: Policy-Driven Access for Cyber Resilience

Sachin Loothra, Lead Solutions Architect, Telia

  • Rising cyber threats and their impact on organisational resilience
  • Policy-driven access as the foundation for Zero Trust implementation
  • How Zero Trust reduces breach impact and ensures business continuity

►Panel discussion: Building Resilient Cyber Risk Management

Simon Brady, Chairman, AKJ Associates (Moderator) 
Jay Prakash, CISO, Paf 
Ashish Bhadouria, Domain Engineering Manager - Security & Privacy,  Ingka Group 
Jeevan Singh, Head of Cyber Security & Common Infrastructure Services, Nokia Technology Standards 
Kari Keinänen, CISO, Lounea Oyj

  • How can organisations turn risk appetite statements and metrics into practical decision-making tools?
  • With NIS2 and similar regulations, what does “appropriate and proportionate” really look like in practice — and how can risk management guide the response?
  • What makes for strong cyber risk metrics, and how can CISOs and CSOs give the Board real confidence in the organisation’s risk posture?
  • How does a resilience-first mindset shift culture — from blame and prevention to acceptance, preparedness, and recovery?

►What lies ahead in 2026?

Samuli Bergström, Director, Head of CSIRT at Traficom, NCSC-FI

  • What Finland’s cyber-threat landscape looks like right now and we are navigating
  • What attacks are organisations are dealing with right now?
  • Stay ahead: Upcoming threat trends and how to be prepared

AI Impact in Threat Intelligence: What's Changed in Our Life?

Samet Sazak, Senior Solutions Engineer, SOCRadar

  • How AI and large language models have changed day-to-day threat intelligence work
  • Practical examples of how defenders use AI to analyse underground forums, detect brand abuse, and prioritize real risk faster.
  • How threat actors abuse AI, including tools like WormGPT, AI-generated phishing, and automated reconnaissance
  • What still requires human judgment in threat intelligence, and how to avoid over-trusting AI-driven insights