Agenda
Presentations already confirmed include:
►Panel Discussion: Critical Functions: What Really Matters?
Fredrik Hertz, Regional Lead Cybersecurity Consulting, EY (Moderator)
Eric Stenberg, Information Security Officer, Swedbank
Elnaz Tadayon, Cybersecurity Area Manager, H&M
Sofia Frederiksen, CISO, Apoteket
- Prioritisation: Are you and your stakeholders truly aligned on what’s mission-critical?
- Third-Party Dependence: Trust is good—but how much control do you actually have over critical processes?
- Incident Reporting: With rising regulatory demands for transparency, what does effective cyber incident reporting really involve—and what value does that data bring?
► Mitigating personal liability: the changing climate for security professionals
Jonathan Armstrong, Partner, Punter Southall Law
- The changing politics of security.
- Current cases.
- Social Media scrutiny.
- Insurance options for CISOs.
- Golden parachutes and legal support.
► The Heart of IT Security – Blood, sweat and tears… of joy?
Björn Johrén, CISO, Max Matthiessen
- Security first culture and how will we cope with the change?
- With all AI in the tech around us, do we still need humans? [or will AI prove humans are surplus to requirements?]
- The strongest line of defense and the most vulnerable link – The human paradox.
►Securing Critical Infrastructure with IAM in an elevated threat landscape
Sachin Loothra, Lead Solutions Architect, Telia
- Evolving threat landscape and its impacts on critical infrastructure.
- Regulations on critical infrastructure and demands towards IAM.
- How IAM solutions can be setup to meet the demands.
►Leveraging DORA TLPT (Threat-Led Penetration Testing) to enhance Cyber Resilience
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
- How DORA TLPT aligns seamlessly with TIBER-EU, CBEST & DORA to enhance cyber risk management.
- Discover the benefits of an EU-standard approach to threat-led testing.
- See how DORA TLPT boosts readiness for live system testing.
- Learn how to start using DORA TLPT for ongoing cyber resilience and regulatory compliance.