Agenda
09:00 - 09:50 |
Breakfast & Networking Break |
09:50 - 10:00 |
Chair's Welcome |
10:00 - 10:20 |
►Navigating Finland's cyber threat Landscape 2025 Samuli Bergström, Director, Head of CSIRT at Traficom, NCSC-F
|
10:20 - 10:40 |
►Exposing Shadow Assets: Hidden Risks Online Jonas Gyllenhammar, Senior Solutions Engineer, Censys
|
10:40 - 11:00 |
►Practical Approaches to Managing Third-Party Risks and Incident Communication John van Uden, CTO, Nordea
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
►Securing Critical Infrastructure with IAM in an elevated threat landscape Sachin Loothra, Lead Solutions Architect, Telia
|
11:50 - 12:20 |
► Fireside Chat: Mitigating personal liability: the changing climate for security professionals Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
12:20 - 13:00 |
►Education Seminars Delegates will be able to choose from the following education seminars:
|
13:00 - 14:00 |
Lunch & Networking Break |
14:00 - 14:20 |
►Maximizing Security Budgets: Integrating People, Processes, and Technology Jani Räty, CISO/Associate Director, Nordic Investment Bank
|
14:20 - 14:40 |
►Defending Data in the Age of AI, how to securely accelerate enterprise AI adoption. Sami Laurila, , Rubrik X
|
14:40 - 15:00 |
►Leveraging DORA TLPT (Threat-Led Penetration Testing) to enhance Cyber Resilience Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
15:00 - 15:20 |
Networking Break |
15:20 - 16:00 |
►How do we cost effectively build Security into Third-Party Risk Management and Supply Chain Strategies Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:00 |
Conference Close |
Education seminars
How Non-Human Identities Create Operational and Cyber Risk for Organisations
Lars Gotlieb, Regional Manager Nordics, Silverfort
Kev Smith, Principal Sales Engineer EMEA, Silverfort
Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.
Attendees will learn:
- Understand why Non-Human Identities should be a top priority for your board
- Learn about how to measure and detect the level of risk Non-Human Identities pose for your organisation
- Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach
Recorded Future
Julius Nicklasson, Sales Engineer, Recorded Future
The Emerging Threat Landscape
Attendees will learn:
- Which key trends have emerged in the ransomware landscape over the past year
- The rise of mass-exploitation vulnerabilities
- Emerging threat actor behaviour
- Has Generative AI already changed the threat landscape for good?