17th Annual e-Crime & Cybersecurity Congress NORDICS

Sweden in the crosshairs: time to strengthen defences 

April 23rd, 2026, Stockholm, Sweden 

As a range of attackers continues to target Sweden and the Nordic region, public and private sectors must respond

 

Sweden is under attack - and it's spending more on cybersecurity

Sweden is under attack, Prime Minister Ulf Kristersson said earlier in the year following three days of disruptions targeting public broadcaster SVT and other key institutions. 
"We are exposed to enormous cyberattacks. Those on SVT have now been recognised, but banks and Bank-id have also been affected," he said. 
Those attacks were followed by August's Miljodata ransomware attack which impacted roughly 200 municipalities and regions, disrupting HR systems for employee health and accident reporting. The attack is considered one of the largest in recent years, and sensitive personal data was potentially leaked. 
And in mid-November NoName057(16), a pro-Russian hacktivist group, targeted Sweden as the main focus of its DDoS campaign, replacing Denmark, which led the previous wave. The group used its volunteer-powered DDoS tool, DDoSia, to target government services, transport systems, telecom networks, and public platforms across several regions. 
These incidents have prompted the government to up spending. Sweden's proposed 2026 defence budget included SEK0.37 billion for enhanced cyber security, come to SEK49.83 billion. Organisations outside the government need to do the same. 
 

So, what should organisations spend that additional budget on?:

•    Fixing gaps in foundational cyber hygiene: asset inventory & configuration management; patch automation and vulnerability management; network segmentation /microsegmentation; endpoint posture assurance.
•    Identity security: identity lifecycle management & privileged-access hardening; unifying 1AM, PAM, CIEM, and SSO into a coherent identity fabric; conditional access with continuous risk scoring; identity threat detection (ITDR); MFA hardening+ phishing­-resistant methods (FIDO2, passkeys).
•    Detection and response modernisation: XDR + Al-augmented SOC; automated incident response and playbooks; adversary-simulation tooling to tune detections.
•    Third-party and SaaS risk: Continuous external attack-surface monitoring of vendors; automated evidence collection & assurance workflows; Contract-level visibility of data access, and attack/threat data.
•    Data security and data governance (especially in Al-driven environments): data discovery; DSPM (Data Security Posture Management); guardrails for LLM/AI usage: data leakage prevention, policy enforcement.
•    Cloud security maturity uplift: CSPM ➔ CNAPP transition (holistic cloud posture + workload protection); Zero-Trust enforcement across multi-cloud; Identity control in cloud environments.
•    Business continuity and resilience engineering: immutable backup architecture+ automated recovery; mapping minimum viable business processes; dependency mapping across apps, vendors, cloud, data.

 

The e-Crime & Cybersecurity Congress Nordics will look at how cybersecurity professionals can stay ahead of a rapidly evolving attack environment. Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market.  

  • Making the best use of threat intelligence

    • In a pre-emptive security model, timing is everything — success depends on detecting and neutralizing threats before they become active incidents.
    • To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs).
    • They need external, real-time context about emerging threats — where do they get it?
  • Security Posture Management

    • Traditional vulnerability scanners don’t handle cloud native architectures well.
    • Today’s cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long.
    • So how do you adapt to that dynamic, API-driven reality? How can traditional tools connect the dots – not just generate tickets?
  • Improving continuous attack surface discovery

    • You need to know what attackers can see and what they can actually attack – and you need it on a continuous basis, not in some static inventory.
    • Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context.
    • Is this feasible and is it cost effective?
  • The power of automation

    • There’s too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APIs, ticketing systems, threat intelligence feeds, and even email servers.
    • It also coordinates actions across tools via APIs and prebuilt integrations and intelligent playbooks.
    • Well, that’s the theory. How does it work in the real world?
  • Adversary simulation and behavioural analysis

    • Automated adversary simulation identifies telemetry blind spots.
    • They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROIs as well as providing board and audit reporting.
    • How well do they work in practice?
  • Dealing with regulations

    • CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands.
    • They must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret those differently later.
    • They face unrealistic expectations around incident reporting and they face personal liability. Can RegTech help?
  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility?
    • And what about anomaly detection after that?
  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away from the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security. Can you help?

Who attends

Job titles

CISO
Developer
Information Security Analyst
Tech Lead
Security Engineer
IT System Administrator
Senior Security Professional
Risk Officer
IT Security Expert & Threat Hunter
Security Generalist
Compliance and Risk Manager
Chief Information Security Officer (CISO)
Information Security Control Manager, Swedish Banking
Information Technology Support Engineer
Cyber Security Compliance Expert
IT Security Specialist
Cyber Security Manager
ISO Information security Officer
Chief Security Officer (CSO)
Risk Officer
Senior IT Security Specialist
Trade and Transaction monitoring Officer - Financial Crime prevention
IT Security Specialist
Cyber security Expert
Senior IT Security Specialist
CIO
Reg Tech
Chief Security Officer (CSO)
Executive Director, Europe
Information Security Officer
Information Security Specialist
Information Security Manager
Director of Operation – R&D Product Management and Technology
Cybersecurity Manager
Data Protection Manager
Director of Information Security
FCP and Cybersecurity professional
Security Operations Manager
Security Advisor
Head of IT Governance
Enterprise Architect | Cybersecurity | Program management
Head of IT
Nordic Head of Cyber Underwriting
Cybersecurity Practice Lead
Group Data Privacy Business Partner
IT Admin
Senior Business Risk Manager
Senior Security Lead | Country Information Security Risk Manager-Sweden
Group CIO
Information Security Manager
IAM Specialist
Junior Information Security Specialist
Senior Advisor Security
CISO
Acting CIO
System Security Manager
IT Architect
CISO
FCP IT-Architect
Head of Information Security
Administrative Support
Head of Financial Crime and Cybersecurity
Data Protection Manager
CISO
IT-säkerhetsansvarig
Systems Engineer IT and Information Security - GRIPEN Divisions
Director - Operational Risk and Information Security
Cyber Incident Management - Nordics Lead
Global Compliance Manager Data Privacy
Information Security Officer
Security Architect
Service & Solution Manager
Information Security Manager for Large Corporates and Institutions
Global Head of Product Security
Information security expert
Head of IT & Infosec
Senior Business Developer
Senior Security Advisor
IT Security Operations Manager
Software Architect
Cyber Security Engineer
Security Specialist
Data Protection Officer
Senior IT Security Officer
Cloud Security Engineer
Vice President
CISO
Head of Information Security (CISO)
Head of Development Group IT
Information Security Officer
IT Security Specialist
Head of Security
Senior Model Risk Manager- Governance and Control
Senior Cloud Architect
Senior Project and Program Manager
Chief Information Security Officer
Cybersecurity Area Manager
Privacy Specialist
IT Development Service Manager
Cybersecurity Associate
Cyber Security Engineer
Cyber Crime
Head of Security & Compliance
Fraud Prevention Specialist
CISO
Project Manager IT
IT Internal Audit Senior Manager
Senior IT Architect
Head of Group Security /CISO
Risk Officer
Information Security Architect
Information Security Manager
Compliance Officer
CISO
IT
Security Product Manager • BNEW DNEW OP SC Security & Compliance
IT Solutions Manager
Chief Security Officer
Group Manager
Mobile App Developer

Companies

Entidade Reguladora dos Serviços Energéticos
Anyfin AB
LeoVegas Group
Swedbank
KRY
EasyPark Group
Telia Company
Bankgirot
PostNord Group AB
Ericsson
Ericsson
Medius
Swedbank
Anyfin AB
Scania
Skandia Banken
EY
Northmill Bank
Bankgirot
Bankgirot
Trygg
Guaranty Trust Bank
Swedish Pensions Agency
H&M
SVT
Entidade Reguladora dos Serviços Energéticos
AFRY Group
Transdev Sverige AB
Financial Services Information Sharing and Analysis Center (FS-ISAC)
PostNord Group AB
H&M
Swedbank
Vizrt Group
Unilabs
Nordic Entertainment Group (Viaplay Group)
OVO Group
Handelsbanken
Ericsson
Ericsson
Lendo Group
Länsförsäkringar AB
Kivra AB
Riskpoint Group
EY
Sandvik AB
Futuraskolan International School of Stockholm
Nordea
Hitachi Energy
Camfil AB
Kommune Kredit
Tele2 (Tele2 Sverige AB)
Trygg
Swedenergy
Max Mattheissen
Handelshögskolan i Stockholm The Stockholm School of Economics (SSE)
Ericsson
Securitas Sverige AB
Ahlsell Sverige
Handelsbanken
Tele2 (Tele2 Sverige AB)
WTW
Finanssiala ry - Finance Finland (FFI)
Nordic Entertainment Group (Viaplay Group)
Wasa Kredit AB
Socialstyrelsen
Swedish Defense Materiel Administration (FMV - Försvarets materielverk)
FCG
Marsh
Sandvik AB
Qliro AB
Swedbank
Bankgirot
Swedbank
Vizrt Group
Sveriges Riksbank
Hemnet
Nordea
Ericsson
Acne Studios
Skandia Banken
Hitachi Energy
Västra Götalandsregionen
ITB-MED AB
Swedish Pensions Agency
Hive Streaming
Stockholm Corporate Finance
Advokatfirman Vinge
Axfood AB
Swedbank
PostNord Group AB
Qliro AB
Starvito
Swedbank
Länsförsäkringar AB
ICA AB
TF Bank AB
H&M
Ericsson
Swedbank
EQT Partners/EQT AB
EQT Partners/EQT AB
Swedish Police Authority
Ericsson
Arelion Sweden AB
Olink Proteomics
Ericsson
Autoliv
Vattenfall
Folksam
Swedbank
ICA AB
Trygg
Saab Group
MedMera Bank AB
Voyado
Ericsson
Lunds Kommun
EVRY Sverige
Scania
Skandia Investment Group

Industries

Regulator
Banking
Casinos/Gaming
Banking
Healthcare Services
Transportation/Shipping
Telecommunications
Banking
Transportation/Shipping
Hardware
Hardware
Software
Banking
Banking
Transportation/Shipping
Banking
Accounting/Auditing
Banking
Banking
Banking
Insurance
Banking
Insurance
Retail
Media
Regulator
Industrial Engineering
Transportation/Shipping
Banking
Transportation/Shipping
Retail
Banking
Software
Pharmaceuticals
Media
Electricity
Banking
Hardware
Hardware
Banking
Insurance
Software
Insurance
Accounting/Auditing
Construction
Education
Banking
Electricity
Retail
Banking
Telecommunications
Insurance
Electricity
Insurance
Education
Hardware
Security Product Vendor
Retail
Banking
Telecommunications
Insurance
Banking
Media
Banking
Healthcare Services
Aerospace/Defence
Insurance
Insurance
Construction
Banking
Banking
Banking
Banking
Software
Banking
Real Estate
Banking
Hardware
Retail
Banking
Electricity
Healthcare Services
Healthcare Services
Insurance
Telecommunications
Banking
Legal
Retail
Banking
Transportation/Shipping
Banking
Software
Banking
Insurance
Retail
Banking
Retail
Hardware
Banking
Banking
Banking
Regional Law Enforcement
Hardware
Telecommunications
Biotechnology
Hardware
Automobiles/Parts
Electronic/Electrical Equipment
Insurance
Banking
Retail
Insurance
Aerospace/Defence
Banking
Software
Hardware
Regional Government
Software
Transportation/Shipping
Banking


Venue

7A Odenplan, Stockholm

loke

Location: 

7A Odenplan

2nd floor, Odengatan 65

113 22 Stockholm


Telephone: +46 8 586 107 00