Agenda
| 08:30 - 09:30 |
Registration and Breakfast Networking |
| 09:30 - 09:40 |
Chair's Welcome |
| 09:40 - 10:00 |
►Secure Your Supply Chain — Secure Your Organisation Geoffrey Taylor, Information Security Officer, Nordea Asset management
|
| 10:00 - 10:20 |
►From Reactive alert management to Proactive Internet Intelligence Martin Solang, Sales Director Nordics and Jonas Gyllenhammar, Sr. Sales Engineer, Censys
|
| 10:20 - 10:40 |
►Identity is the New Perimeter: Combine prevention and recovery to ensure organisational survivability during and after an attack Sami Laurila, GTM Leader Northern Europe Identity & AI Technology, Rubrik
|
| 10:40 - 11:00 |
►From Awareness to Accountability: Building a Security Culture That Lasts Heléna Malm, Head of CSO Office, Swedbank AB
|
| 11:00 - 11:30 |
Networking Break |
| 11:30 - 11:50 |
►Kill the Click: DNS Blocking That Shut Down Scams at Scale Timo Wiander, Information Security Manager, LocalTapiola
|
| 11:50 - 12:10 |
►Securing Every Identity: Humans, Machines, and AI Chris Dearden, Lead Sales Engineer, Delinea
|
| 12.10 - 12.15 |
►Zero Trust Controls at the Endpoint Sean Whelan, Enterprise Account Executive, Threatlocker
|
| 12:15 - 12:55 |
►Education Seminars Delegates will be able to choose from the following topics:
|
| 12:55 - 14:00 |
Lunch Networking Break |
| 14:00 - 14:20 |
►Cyber Leadership in an era of Dis-Cooperation William Dixon, Associate Fellow, Royal United Services Institute and Senior Technology Cyber Fellow, The Ukraine Foundation
|
| 14:20 - 14:40 |
►AI Impact in Threat Intelligence: What's Changed in Our Life? Samet Sazak, Senior Solutions Engineer, SOCRadar
|
| 14:40 - 15:00 |
►In the Cyber Trenches: War Stories from 200,000 Pentests Christof Jacques, Solutions Architect, Horizon3.ai
|
| 15:00 - 15:20 |
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
|
| 15:20 - 15:50 |
Networking break |
| 15:50 - 16:20 |
►Panel Discussion: Beyond Compliance — Building Cyber Resilience That Actually Works Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England (Moderator)
|
| 16:20 - 16:30 |
Chair's Closing Remarks |
Education seminars
Sweden Under Attack: A Blueprint for ProAIctive Defence
Andy Quaeyhaegens, Consultant Channel Solutions Engineer, Netskope
With Swedish enterprises under constant fire from AI-powered threats, protecting your assets requires more than a firewall. Learn how Netskope’s context-aware security moves you from static 'No' to intelligent 'Know,' providing full data control across the AI frontier. Don't just defend; take the AI fast lane with confidence
Attendees will learn:
- Neutralizing AI Threats: Master strategies to counter high-velocity, automated attacks on Swedish infrastructure.
- Intelligent Data Control: Shift from "No" to "Know" with context-aware security for GenAI.
- The ProAIctive Blueprint: Practical steps to safely accelerate AI adoption without compromising security.
Visibility, Governance, and Control: Protecting Enterprise Content Across Files, M365, and AI
Mert Topaloglu, Presales Manager, FileOrbis
As enterprise content becomes increasingly distributed across file servers, Microsoft 365, cloud platforms, and different storages, organizations face growing challenges around visibility, governance, and control. Sensitive information is often scattered across multiple repositories, shared beyond intended audiences, or fed into AI systems without sufficient oversight.
Attendees will learn:
- Why securing enterprise content requires more than traditional file storage or access management.
- How organisations can gain visibility into where content resides, understand what types of sensitive data they have, and apply consistent governance policies across files, Microsoft 365, and AI environments.
- The importance of content-aware controls, secure sharing, automated remediation, compliance, and centralized management in reducing risk while supporting productivity.
- From unstructured data on file servers to collaboration in Microsoft 365 and emerging AI use cases, this discussion will provide practical insights into how enterprises can better protect, govern, and control their content everywhere.