Agenda
| 8:00 - 9:00 |
Breakfast Networking Break |
| 9:00 - 9:10 |
Chair's Opening Remarks |
| 9:10 - 9:30 |
►What lies ahead in 2026? Samuli Bergström, Director, Head of CSIRT at Traficom, NCSC-FI
|
| 9:30 - 9:50 |
►The Future of Cyber Resilience: Securing the Exposed Edge of Critical Infrastructure Martin Solang, Sales Director Nordics & Benelux, Censys & Jonas Gyllenhammar, Senior Sales Engineer, Censys
|
| 9:50 - 10:10 |
►Identity is the New Perimeter; Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack Sami Laurila, GTM Leader Northern Europe Identity & AI Technology, Rubrik
|
| 10:10 - 10:30 |
►Why Quantum Cryptography Isn’t Really a Technology Problem Rune Espensen, Head of Information Security Office, Nordea
|
| 10:30 - 11:00 |
Networking Break |
| 11:00 - 11:20 |
►Zero Trust in Action: Policy-Driven Access for Cyber Resilience Sachin Loothra, Lead Solutions Architect, Telia
|
| 11:20 - 11:40 |
►Unmasking Fraud. The Lifecycle and Operational Dynamics of Identity Deception Marcin Zimny, Senior Principal Solution Architect, PingIdentity
|
| 11:40 - 11:45 |
►Zero Trust Controls at the Endpoint Fidel Nozal, Account Executive, ThreatLocker
|
| 11:45 - 12:25 |
►Education Seminar Delegates will be able to choose from a range of topics:
|
| 12:25 - 13:30 |
Lunch Networking Break |
| 13:30 - 13:50 |
►Cyber Leadership in an era of Dis-Cooperation William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation
|
| 13:50 - 14:10 |
►Privileged Identities: The Front Door of Modern Cyber Attacks Scott Shields, Enterprise Sales Engineer, Delinea
|
| 14:10 - 14:30 |
►AI Impact in Threat Intelligence: What's Changed in Our Life? Samet Sazak, Senior Solutions Engineer, SOCRadar
|
| 14:30 - 14:50 |
►How Neste Built a Business-Driven Cyber Risk Program Santtu Erkkilä, Cyber Governance, Risk & Compliance Lead, Neste
|
| 14:50 - 15:20 |
Networking Break |
| 15:20 - 15:55 |
►Panel discussion: Building Resilient Cyber Risk Management Simon Brady, Chairman, AKJ Associates (Moderator)
|
| 15:55 - 16:00 |
Chair's Closing Remarks |
Education seminars
Utilise your Threat Intelligence to Improve your Security Posture, Continuously!
Magnus Lundgren, Sales Director Nordics, Filigran
In today’s dynamic threat landscape, collecting threat intelligence feeds is no longer enough. Organisations must transform raw data into actionable insights by aligning intelligence with critical assets and business risks. This approach ensures that security teams prioritise what truly matters, reducing noise and focusing on threats that pose the greatest impact. Breaking down operational silos is essential, integrating intelligence sharing across SOC, CTI, vulnerability management, and leadership fosters collaboration and accelerates decision-making. When these teams work in harmony, organisations can respond faster and more effectively to emerging threats.
A robust security posture requires more than one-time improvements; it demands continuous refinement. Establishing a feedback loop between threat intelligence, detection engineering, and security validation creates a cycle of measurable progress. This iterative process enables organisations to adapt to evolving adversary tactics while validating the effectiveness of their defenses. By embedding intelligence into detection and validation workflows, security teams can proactively identify gaps and strengthen resilience.
To operationalise these practices at scale, organisations need flexible, transparent platforms, not rigid, black-box solutions. Filigran’s open, collaborative intelligence platform empowers teams to share, enrich, and act on intelligence seamlessly. Its design promotes interoperability and scalability, ensuring that threat intelligence becomes a living, breathing component of your security strategy rather than a static feed. With Filigran, organisations can orchestrate intelligence-driven workflows that unify stakeholders, enhance visibility, and deliver tangible improvements in risk reduction. Continuous improvement is not a luxury, it’s a necessity. By leveraging threat intelligence strategically, breaking down silos, and embracing open collaboration, organisations can stay ahead of adversaries and build a security posture that evolves as fast as the threats they face.
Attendees will learn:
- Don't just collect threat intel feeds - drive context and priority from it and align it with your organisation’s critical assets and business risks
- Break down silos - orchestrating intel sharing across SOC, CTI, vulnerability management, and leadership, enabling faster, better-informed decisions
- Establish a continuous feedback loop - between threat intelligence, detection engineering, and security validation to drive measurable improvements in security posture
- Leverage Filigran’s open, collaborative intelligence platform to operationalise these practices at scale, without locking yourself into rigid, black-box tooling
From Defensive Security To Cyber Resiliency
Karsten Dreyer Lund, Channel Solutions Engineer, Commvault
In today's threat landscape, where ransomware has become a $57 billion global crisis, traditional security models are proving insufficient. Organisations are investing heavily in prevention, yet breaches continue to occur - highlighting a critical gap between security plans and recovery readiness.
This session explores the fundamental shift from defensive security to cyber resilience, examining why prevention alone isn't enough and how organisations can prepare for - and assume - breach. We will discuss practical frameworks for building recovery readiness, the critical differences between disaster recovery and cyber recovery, and why testing your ability to restore operations is just as important as preventing attacks in the first place.
Attendees will learn:
- Understand the "Assume Breach" Paradigm – Why traditional security investments focus on prevention while recovery readiness remains critically underdeveloped, and how to rebalance your resilience strategy
- Distinguish Cyber Recovery from Disaster Recovery – Learn the fundamental differences in scope, goals, and methods between operational recovery, disaster recovery, and cyber recovery scenarios
- Build and Test Your Minimum Viable Company – Identify which critical applications and systems you need to resume operations, and why frequent testing is essential to validate recovery readiness
- Shift Your Success Metrics – Move beyond traditional RTO/RPO to Mean Time to Clean Recovery (MTCR) and understand why identifying your last clean backup point is critical to cyber resilience