The C-Suite Editions

The most exclusive Cyber Security events in the world.

24
Oct

14
Nov

13
Mar

A most exclusive Gathering
Partaking are:

Stratsys

CISO

FedEx

Managing Director Information Security

Doctrin

CISO

Voyado

Head of Information Security

Quinyx

CISO

Einride

Head of Security GRC

DNB

Head of IT & Facility Management

Max Matthiessen

Information Security, Risk & Compliance

Bulls Press

CIO

Schneider electric

CISO

ABN Amro Bank

Head of Data Insights and Issue Management

Svenska Spel

CISO

Comex Electronics AB

Head of IT and Security

AXFOOD

CISO

Apotek Hjärtat

CISO

Max Matthiessen

Information Security, Risk & Compliance

Huawei Nordics & The Baltics

CTO

Creanord Oys

Director of Product Management

SEB

Infrastructure Architect Solution Expert

SPIROMANN

CTO

Sectra

Group CISO

COOR SERVICE MANAGEMENT GROUP AB

Head of IT Security

Sandvik

Compliance Officer

Ericsson

Senior Specialist

Sveriges kommuner och regioner

CISO

Eyeonid

CSO

Huawei Nordics & The Baltics

Country Manager

Volvo Construction Equipment

Ciso/Biso/cybersecurity enterprise architect

Aurobay

CISO

Kungliga Hovstaterna

CIO

Luleå komun

Chef informationssäkerhetsenheten

Consilium Safety Group

Head of Group IT

Sympa

CISO

Consilium Safety Group

CISO

Siemify

CTO

Boliden

CISO

Swedbank

Network security

Välinge Innovation AB

Global IT Director

Envirotainer

Head of It Service Operations

Kivra

Head of IT Operations

Telenor Global Services

Vice President, Security Management

Mastec AB

CIO

CramoGroup

CIO

Din Bil Sverige

CIO

ISS A/S

Head of IT

Loomis AB

CISO

Boliden

CIO

Hitta

CTO

Nackademin

CIO

Ericsson

Senior Specialist Security

Aspia AB

CIO

Region Uppsala

IT chef

SaveLend

CISO

Aspia AB

CISO

MedMera Bank AB

CISO

Skandia

IT consultant

DANX Group

CISO

Österlunds kommun

Cyber security Specialist

Elisa Polystar

CISO

Schibsted News Media

Head of cybersecurity

RISE Research Institute of Sweden

Visiting Professor Privacy Information and Cyber-Security

Truecaller

Information Security Manager

Cloud Security Alliance

President of Swedish Chapter

Nordea

Senior Security Officer

Katana

Head of Security and Compliance

Polismyndigheten

Kriminalkommisarie

Dugga AB

CIO

QD Sverige AB

CISO

Polismyndigheten

Business Developer

DataCom AB

CISO

BITS DATA i Södertälje AB

CISO, DPO

WSP Nordic

CISO

Movestic Livförsäkringar AB

Head of IT Operations

LIVS

CIO

Sveriges Kommuner och Regioner

CISO

Internationella Engelska Skolan

CISO

Skania

Cybersecurity Manager

Eriksson

Business Continuity Manager

Jonkoping University

CISO

Stockholm School of Economics

CTO

Danish Energy

CISO

AMRA Medical

CISO/Deputy CEO

Mobile Climate Control

CIO

East police district Norway

Digital Forensics & Cyber Security

SJ AB

Informationsecurityspecialist

The HCi group

CISO

Asurgent AB

Chief of Cybersecurity operation

Consilium Safety Group

CISO

Etraveli Group

Director IT Platform Technology

Etraveli Group

CTO

Getswish

Head of Internal IT & Security

Leaseright

CIO

PBab SE

CISO

Falu Energi & Vatten AB

IT Ansvarig

Inriver AB

Inriver AB

FRENDA

CTO

ClearOn

IT Security Manager

Strivo

Head of IT/CTO

Asurgent AB

Technical Security Advisor

Olink

CISO

FRENDA

CISO

Scania Group

Security Product Manager

Bravida

CISO

Strivo

Backoffice CISO

Ahum

CISO

Alrik

CTO

Alleima AB

Manager GRC, Digital Security

Entercard Group AB

Information Security Risk Specialist

Pbab SE

Information Security Manager

Savelend Group AB

COO/CIO

LommisPay

Technical and security Engineer

Asurgent AB

Technical Security Advisor

Pedab

CTO

Apoteket AB

Head of Information

Benify Group

Information Security Specialist

Nasdaq

Senior Security Manager

Mercur Solutions AB

CIO / CISO

Epiroc AB

Information Security Specialist

Stora enso

Head of Information & Cyber Security

Max Matthiessen

CIO/Group CEO

ATG

Information Security Manager

SPP

CISO

Qliro AB

IT Security Specialist

EDISEN SWEDEN AB

Head od IT – EMEA

H&M

Cyber Security Specialist

RISE RESEARCH INSTITUTES OF SWEDEN

Coordinator of the Swedish National Cybersecurity Node

Alfa eCare AB

CISO

Earlybird

CIO

RISE RESEARCH INSTITUTES OF SWEDEN

Director of Cybersecurity Unit

Sveriges Kommuner och Regioner

Cybersäkerhetsstrateg

Lumera

Head of IT

Lumera

CISO

Clear on

CTO

Anticimex

Head of IT

Handelsbanken

CIO

SEB

Threat intelligence | Information security

Axfood

IT Security Expert

UC AB

IT Security Manager

SVT (Sveriges Television)

Head of Distribution and Infrastructure

Matercard

Vice President Cyber and Intelligence Solutions

ICA Sverige AB

CIO

NWT Gruppen AB

CIO / CISO

Oatly

CIO & Executive Vice President Business Tech

Extenda Retail

Director of IT & IS

Gävle Energi AB

CISO

Ericsson

CISO

Brunel International

CISO

H&M

CISO

Axel Johnson International AB

CIO

DataCom

Head Of Operations

Diri AS

CCO

Ericsson

Business Continuity Manager for Group Functions

Aurobay

CISO

ELA Analytics AS

Chief Technology Officer

JM

CISO

Ålands Telekommunikation Ab

CIO

Black Nights Film Festival

Head of IT

BITS DATA i Södertälje AB

Security Analyst

Incertum AB

Senior Security Advisor

Viavi Solutions

Strategy Director

RISE RESEARCH INSTITUTES OF SWEDEN

Coordinator of the Swedish National Cybersecurity Node

Alfa eCare AB

CISO

Earlybird

CIO

RISE RESEARCH INSTITUTES OF SWEDEN

Director of Cybersecurity Unit

Sveriges Kommuner och Regioner

Cybersäkerhetsstrateg

Business France Nordics

Head of tech and innovation

Freespee

Cloud Security Engineer

Clearon AB

Commercial Manager IT-Operations and Security

Wallenius Wilhelmsen

IT Service and Technology Manager

Skogsstyrelsen

CISO

MFEX by Euroclear

CISO

Modular Management

CTO

Assured AB

IT Security Consultant

Estonian Tax and Customs

CISO

Handelsbanken

Head of development transaction banking

Vattenfall

Chief Information Security Officer

Arbetsförmedlingen

IT-Direktör (CIO)

Pysslingens Förskolor och Skolor AB

CISO

Camfil

Chief Information Officer

Health Solutions AB

CIO

ABN AMRO BANK N.V.

Global Chief Information Security Officer

ING Bank

Cloud Security Manager

ENISA

Cybersecurity Officer

Booking.com

Program Leader

Uber

Western and Southern Europe Security Specialist

Europol

Cybersecurity Evangelist

Mollie

Head of Security Operations

Coosto

CISO & DPO

Nexpay

CISO

East police district Norway

Digital Forensics & Cyber Security

LKQ Europe

Information Security Manager

Alfen

Corporate Information Security Officer

Nobian

Executive Subject Matter Expert – Cyber Security IT/OT

Western Switzerland (RC3) at State of Geneve

Head Regional Cyber Competence Centres

Exact

CISO

SentinelOne

Marketing

Institute for Security and Safety GmbH

Director

Tinka

CISO

Rabobank

Project and Change Manager for Chapter Security & In Control

Trivium Packaging

Senior Cloud Platform Engineer

Stichting BKR

CIO

Currence iDEAL

Head of Information Security

Noot

CIO & CISO

Takeshape B.V.

CISO

Municipalitt Alkmaar

CIO

NNEK B.V.

CIO

Nexpay

Information systems manager (ISM)

Status Plus

CIO

expondo GmbH

Chief Technology and Product Officer

Embassy of Israel

Trade Officer

Embassy of Israel

Economic Attaché

LKQ Europe

Information Security Manager – Customer Applications

BZK (Ministry of the Interior and Kingdom Relations)

CTO/CIO

RufusAI

CTO/CIO

Aegon

CISO

Philips

Head of Data Security

DLL Group

Manager Security Risk Mgmt

Kiwa N.V.

CISO

Abn amro

Domain Security Architect

RIPE NCC

CISO

Gemeente Amsterdam

Adviseur CIO Office

Intus Workforce Solutions

CTO / CPO

Stichting BKR

ICT Operations Manager

BERG Toys BV

Manager IT

Brunel International

CISO

BLST Security

Chief Revenue Oficer

Certification Courses Ltd

CISO

Synchronized

CRO

GNX

General Counsel / CISO

Currence iDEAL

Head of Security

BERG Toys B.V.

System Administrator

NN group

Information Security Officer

Stichting Studielink

CISO

Clear.bio

CISO

Clear.bio

CTO

Touch Biometrix Ltd

CIO&Founder

DOXFLOW LEGAL

Privacy Expert Certified Data Protection Officer CIPP/E

Stibbe

CISO

Oom Verzekeringen

CISO

Grey Rhino IT Solutions B.V.

Chief Information Officer

Ministry of Infrastructure and Water management

IT Security Manager

ABN AMRO Bank N.V.

Head of Data Insights and Issue Management

Mollie

SOC Manager

Daoust

CISO

NWO-I

CISO

WEngage

CISO

Modexpress

CIO

DNV Energy Systems

Business Director Digital Grid Operations & Cyber Security

EMS, a Fiserv company

Head of Information Security & Risk Management

Kyocera Document Solutions Europe

IT Compliance Specialist

Waarderingskamer

Chief Information Officer

Lavendel Consulting

CIO

Pensionfund Rail & Public Transport

CISO

Damen Shipyards

CISO

Kyocera

European Information Security Officer

Must Read Articles

  • All Post
  • Access Control
  • AI
  • Blog
  • E-crime
  • Hot
  • Phishing
CloudNordic Under Siege

August 29, 2023

Introduction In a shocking turn of events, hosting providers CloudNordic and AzeroCloud, based in Denmark, recently suffered a devastating…

Zero Trust Architecture

August 9, 2023

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating…

Load More

End of Content.

If want to know more:
Register for the Upcoming Events

Upcoming Events

2025

What is
NEXT IT Security?

Next IT Security brings together C-Level cybersecurity decision makers for a day of expert-led discussions on the most current security challenges. This event provides an invaluable opportunity to explore the latest developments in cybersecurity.

Expert-led discussions

We invite the best and brightest in the industry to share their knowledge and insights on cybersecurity. The event is curated by our team of experts who are also speakers at the event.

Meet like-minded people

Next IT Security provides attendees with an opportunity to network with other professionals who have similar interests in cybersecurity. Attendees can also find potential employers or employees for their company.

Learn about new Trends

Next IT Security features keynote speeches from renowned speakers on hot topics such as malware and ransomware prevention and mitigation, mobile security, cloud security etc.

A day of networking

We have an abundance of networking opportunities with our break out sessions and informal round tables which allow you to meet like-minded people. You’ll never struggle for conversation again!

WHY SHOULD YOU JOIN
OUR CONFERENCE

Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.

Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking
0 +

Networking

At Next IT Security, you will have the chance to connect with hundreds of industry professionals from a wide range of sectors and areas across the Nordics

Here, you will have the opportunity to build meaningful relationships with people who have experienced similar struggles and successes in their respective fields.

Networking and forging strategic partnerships are encouraged so that you can leave the event with a wealth of valuable connections.

Welcome to the Next IT Security – C-Suites Edition, the most EXCLUSIVE cyber security event in the world, where we will bring together cybersecurity leaders and experts from the Nordic to share knowledge and insights on the latest trends and technologies in the field. 

In this edition of C-Suites we will delve with some interesting business critical topics.

  • Advanced New Technologies in the Service of Security Awareness: Explore how emerging technologies are reshaping Security Awareness programs, empowering organisations with novel tools and strategies.
  • Quantum Computing Takes Center Stage: Witness the practical accessibility of quantum computing with the latest market innovations, unravelling a new era of computational possibilities.
  • Unveiling the Vulnerable World of IoT: Embark on a journey to the edge of cybersecurity, where IoT vulnerabilities pose unprecedented challenges, and innovative solutions are paramount.
  • NIS2, DORA & GDPR Continuing Impact: Navigate the evolving landscape shaped by NIS2, DORA, and GDPR regulations, influencing cybersecurity strategies and compliance measures. 
  • Cloud Challenges – Data Loss, Shared Vulnerabilities, and More: Explore the complexities surrounding data loss and recovery, shared vulnerabilities in cloud environments, and the ongoing struggle for control and visibility in the cloud landscape.

Next IT Security aims to equip our readers with insights into the forefront of cybersecurity, where adaptation and innovation are indispensable in safeguarding the digital frontier. 

Our goal is to create a collaborative environment where cybersecurity C-Suites can exchange ideas and best practices.

Agenda

08:00

Registration

08:15

Power Breakfast

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

09:00

  • Role of law enforcement: Craig’s presentation delves into how law enforcement, including organizations like INTERPOL, plays a vital role in preventing, detecting, and disrupting cybercrime on national, regional, and global scales.
  • Collaborative efforts and innovative strategies: Explore the collaborative efforts and innovative strategies employed by law enforcement agencies and public-private partnerships worldwide to safeguard digital infrastructure and combat cyber threats effectively.
  • International cooperation and capacity building: Gain insights into the proactive measures taken by law enforcement and other stakeholders to enhance international cooperation, information sharing, and capacity building, crucial for upholding the rule of law and combating cybercrime amid complex geopolitical dynamics.

Craig Jones

Director Cybercrime at INTERPOL

09:25

  • Everything starts with awareness. A chain is only as strong as its weakest link. Don’t shy away from the new techniques emerging in the market. Embrace them and leverage them to your advantage—this is the path to success.
  • Awareness is your responsibility. If it’s not at a basic level, there are no excuses. You will be held accountable if something goes wrong. Therefore, you need to be both a manager and a psychologist, more than just a technician, and find appropriate ways to reach every individual. Use all resources available.
  • Trust is key to success in everything, both for people and technology. However, you must always maintain control and manage the business without relying 100% on any single solution. Leaders in their sectors understand this well, especially in alignment with the rigorous Nordics Digitalization Standards.

Kranti Kumar Dasiri

Director - Security Operations & Incident Response
Nasdaq

Jakob Stenstave

CISO
The HCI Group

Jan Olsson

Kriminalkommissarie
Polismyndigheten, Nationellt It-brottscentrun (SC3)

Jimmi Ernberg

Chief Security Governance
Bankgirot

10:00

Having a successful security posture is more easily said than done. It takes a well-designed strategy for a host of multi-faceted parameters to come together to truly bring security to an organization.

Security Culture, being the ideas, customs, and social behaviors of an organization that influence security, is a powerful tool to help nurture and sustain that which keeps your organization safe.

In this session, we’ll be hearing from industry expert Jelle Wieringa about how you can use security culture to your advantage. Based on statistics from academic research, combined with real-world experience, you’ll hear everything you need to know to better understand what it can bring you and your organization.

In this session you will learn:

  • What defines a Security Culture;
  • How can you measure and better understand your existing security culture;
  • What are proven and practical ways to grow your security culture?

Dr. Martin J. Kraemer

Security Awareness Advocate KnowBe4

10:20

Coffee break and 1-1 meetings

10:50

  • Biometric Authentication Education:

Delve into the realm of biometric authentication and its role in enhancing security awareness. Understand the principles and practices of biometrics, emphasizing the importance of biometric literacy in the modern cybersecurity landscape.

  • Interactive Simulations and Incident Response Training:

Discover the impact of interactive simulations in preparing users for real-world cyber threats. This topic emphasizes incident response training through lifelike simulations, enabling users to practice and refine their responses to security incidents.

  • Cybersecurity Virtual Labs for Hands-On Experience:

Explore the concept of cybersecurity virtual labs, providing hands-on experiences for users to interact with cybersecurity tools and scenarios. Understand the significance of practical learning in building a strong security awareness foundation.

11:15

  • How are organisations identifying the risk levels within their ICT dependencies?
  • What strategies have organisations been adopting to address third-party risk and contracts?
  • Do internal and external auditors accept reduction of controls according to risk?
  • What types of measures can be taken to maintain CIAA whether data is at rest, in use or in transit?

Moderator: Edward Asiedu

Senior Principal Security Strategist
DataBee by Comcast Technologies Solutions

Sofia Staff Frederiksen

Head of Information Security
Apoteket AB

Jan Öhman

CISO
Polystar OSIX

Jacqueline Johnson

CISO
Danish Energy Grid

Giovanni Söderman

Vice President Global IT
Consilium Safety Group

11:50

  • Updates on NIS2 Compliance Requirements:

Explore the latest developments in the Network and Information Systems Directive (NIS2), unraveling the compliance requirements and implications for organizations. Gain insights into strategies for aligning cybersecurity practices with NIS2 standards.

  • DORA Framework for Enhanced Operational Resilience:

Delve into the Depository Trust & Clearing Corporation’s (DTCC) DORA (Distributed Ledger Technology Open-source Regulatory Reporting) framework. Understand how DORA influences operational resilience and cybersecurity practices in the financial sector, providing valuable lessons for diverse industries.

  • GDPR’s Ongoing Impact on Data Protection:

Examine the ongoing influence of the General Data Protection Regulation (GDPR) on data protection practices. Uncover the evolving expectations for data privacy, emphasizing the importance of adapting cybersecurity strategies to ensure continuous compliance with GDPR provisions.

12:10

Lunch Break

13:10

  • We are all aware that we shouldn’t click links in suspicious emails. Then why is it that we do so time and time again.

    In this speech we will dive into the human mind and take a look at how our psychology affects us and our colleagues and why mindless e-learnings does not change our behavior.

    With an easy 5 step framework you can map your risky behaviors, exchange them with secure behavior and even map your progress.

Sarah Aalborg

CISO
Tivoli

13:35

  • Immersive Learning Experiences:

Dive into the world of immersive technologies like virtual reality (VR) and augmented reality (AR) to revolutionize security training, creating lifelike scenarios that enhance user engagement and retention.


  • Gamification for Active Participation:

Uncover the power of gamification in transforming mundane security awareness programs into interactive and engaging experiences, fostering active participation and knowledge retention among users.


  • AI-Driven Personalized Training:

Explore the role of artificial intelligence in tailoring security awareness training, leveraging personalized content delivery, adaptive learning paths, and real-time feedback to address individual learning needs.

14:00

  • Targeting of Internet of Things (IoT) Devices. With the proliferation of IoT devices, cyber criminals will increasingly focus on exploiting their vulnerabilities
  • IoT devices often have weak security measures, making them attractive targets for hackers. We can expect attacks targeting smart homes, connected cars, and industrial IoT systems to become more prevalent.

With the widespread adoption of the internet of things (IoT) , compromise of devices can be used for data theft, botnets, or even physical damage in critical sectors.

Sharon Larsson

CISO Svenska Spel

Ola Pontén

CISO
SCA

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Anders Björklund

CISO
Anticimex Group

14:35

Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE. Discover how autonomous pentesting helps find unknown weaknesses in your infrastructure before attackers do.

During this session, you’ll learn how organizations just like yours are using autonomous pentesting to:

  • Secure their supply chains to ensure they’re not accepting someone else’s risk.
  • Discover weaknesses in cloud implementations that could result in compromise.
  • Set up an early detection system for actual threats in the most high-risk areas.

Snehal Antani

CEO and Co-Founder of
Horizon3 AI

14:55

Coffee Break & 1-1 meetings

15:25

  •       Why detection and response are bound to fail
  •       Networks are too open, accounts are too permissive
  •       Actionable solutions that help prevent

Pieter Wigleven

Director of Customer Engineering at
Zero Networks

15:50

AI: A potential paradise alley for cybersecurity advancements, promising enhanced threat detection, automated response, and efficient risk mitigation. The road to a dystopian future: Concerns arise regarding AI’s susceptibility to manipulation, biases, and unintended consequences, posing new security challenges. Balancing innovation with caution: Embracing AI in cybersecurity requires careful consideration of ethical implications, regulatory frameworks, and proactive risk management strategies.

Per Gustavsson

CISO
Stratsys and Affiliate a Research Faculty, C4I & Cyber Center GMU

Team Blue

Magnus Carling

CISO
Stena AB, a book author of Svart Kod Trilogy and Monster

Team Red

16:25

The transformative impact of quantum computing on cybersecurity. The potential of quantum technologies to disrupt current encryption methods, What will the emergence of quantum-safe cryptographic solutions look like? Strategic implications for securing sensitive data in the quantum era

Martin Karlsson

CISO
Quinyx

Petri Ala-Annala

CISO
Nobia

Alan Lucas

CISO
Homefashion Group B.V.

Jörgen Ottosson

CISO & DPO
Bits Data

17:00

In Mergers and Acquisitions (M&A), cybersecurity emerges as a critical but often overlooked dimension. The talk explores the unique cybersecurity challenges that companies face during M&A transactions, emphasizing the role of the CISO and the security team. We will explore why traditional due diligence processes frequently fall short in adequately assessing risks and the strategies we can employ to manage risks under the pressure of tight deadlines and uncertainty. Using real-world examples and practical tips for effective risk mitigation, the talk aims to equip executives and CISOs with the tools necessary to navigate these high-stakes situations, ensuring a secure and beneficial outcome for all parties involved.

  • Due Diligence Challenges: Discuss the inherent weaknesses in M&A due diligence processes regarding technology and cybersecurity, and why these can lead to unexpected threats.
  • Strategies for CISOs: Proactive strategies and techniques for CISOs to enhance due diligence, have a wide view on risks while understanding the investment narrative and navigate throughout the process without surprises.
  • Post-Merger Integration: How to continue cybersecurity efforts after signing the deal, ensuring the progress of security and integration of the acquired target.

Zsolt Fabian

Group Cybersecurity Lead
Byborg Enterprises

17:20

Book singing by

Sarah Aalborg

CISO
Tivoli

17:30

Networking Dinner Cruise

Highly Exclusive. Operakällaren’s name dates back to 1787 when it was situated in the cellar under Gustav III’s opera house. History permeates the atmosphere in this heritage property, the most prestigious meeting place in Stockholm, is a house filled with opportunities, inspiration and fantastic networking.

We prepared these hot topics crucial for you just in November 2024 due to the unique BeNeLux cyber landscape including: highly interconnected supply chains, dependance on third party vendors, and the region’s high adoption of multi-cloud which is  the next frontier. All these raise the need for a new cloud security operations model and the need for safeguarding your IoT ecosystems.

In addition,  increased cyber threats during the holiday season impose development of a strong cybersecurity workforce,  with you as a leader of building cyber resilience.

That is why you must stay updated on the latest trends to effectively protect your leadership position and your organization.

Agenda November 2024

08:00

Registration

08:15

Power Breakfast

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

08:50

Firestarter Digicert

09:00

  • An in-depth overview of the Threat Intelligence-based Ethical Red Teaming (TIBER-EU) framework, designed by the European Central Bank to enhance cyber resilience across the financial sector.
  • Ransomware Attack: A detailed analysis of a recent ransomware attack on a financial institution, demonstrating how TIBER-EU protocols can identify vulnerabilities, mitigate risks, and improve response strategies.
  • Practical recommendations and best practices derived from TIBER-EU implementation experiences, focusing on strengthening defenses, enhancing threat intelligence, and ensuring robust incident response mechanisms.

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force

09:25

  • What does being a “business enabler” even mean?
  • Does the (C)ISO have the opportunity and resources to enable business?
  • Do organisational structures and perspectives need to change for business enablement by (C)ISOs?
  • Does a high-profile, customer-facing CISO look distracted from the day job?

Moderator: Edward Asiedu

Senior Principal Security Strategist
DataBee by Comcast Technologies Solutions

Jeroen Prinse

CISO
Nationaal Cyber Security Centrum
(NCSC-NL)

Jim Leseman

CISO & COO
Clear.bio

Victoria van Roosmalen

CISO
Coosto

Steven Furnell

Professor of Cyber Security
University of Nottingham

10:00

With digital transformation accelerating across industries, it is crucial to understand its security implications. Gain strategies for securing all your environments and mitigating risks associated with digital transformation initiatives.
• Discover hidden role of cloud technologies in driving digital transformation  across industries.
• What are the security implications of multi-cloud adoption and strategies for securing them effectively.
• Position yourself organization for success in the digital age by embracing changes of digital transformation.
• You will gain insights into securing your organization’s journey through digital transformation and maximizing the benefits of cloud technologies.

10:20

Coffee break and 1-1 meetings

10:50

Why does social engineering work and how can we prevent it? To better understand this age-old question we will delve into the mindset of social engineering attacks, exploring why they work and how we can fight back. We will share insights on using nudges to guide people towards better cybersecurity decisions and emphasise the importance of building a strong cybersecurity culture.

Key takeaways:

  • Understand the mindset and behavioural principles that make social engineering attacks so effective
  • Learn how nudges can be used to encourage better cybersecurity habits
  • Discover the importance of fostering a strong cybersecurity culture within organisations

Javvad Malik

Lead Security Awareness Advocate
KnowBe4

11:15

Anticipate Cybersecurity Evolutions: Explore the anticipated developments in the cybersecurity landscape, both globally and within the Benelux region. Understanding these future shifts will empower you to build resilient and adaptive security frameworks.

Identify Key Drivers of Change: Delve into the key drivers that will shape cybersecurity strategies in 2025, including technological advancements, evolving threat landscapes, and shifting regulatory environments.

Prepare for Tomorrow’s Challenges: Equip yourself with the knowledge to proactively address upcoming cybersecurity challenges, ensuring your organization remains secure and compliant amidst the rapid changes in the digital world.

Sofia Staff Frederiksen

Head of Information Security
Apoteket AB

Jan Öhman

CISO
Polystar OSIX

Filip Nowak

Global Head of Cyber Defence
Ferrero

11:40

Stay ahead of emerging threats and industry trends by gaining insights into the future of cybersecurity globally and in the Benelux. Understanding these trends will enable you to proactively address security challenges and protect your organization effectively.

  • Discover the latest trends shaping the future of cybersecurity.
  • Gain insights into emerging threats, innovative technologies, and regulatory changes that will impact cybersecurity strategies in 2025.

Dr. Martijn Dekker

Global CISO
ABN AMRO BANK

Arnaud Wiehe

Director Information Security
FedEx

Tiago Teles

Head of Data Insights and Issue Management
ABN AMRO BANK

12:10

Firestarter Illumio

12:15

Lunch Break & 1-1 Meetings

13:10

Discover new trends how embedded AI can revolutionize incident response by automating detection, analysis, and mitigation processes. Leverage AI-powered solutions to enhance the efficiency and effectiveness of your incident response capabilities.
• Unlock the potential of your AI solutions to streamline incident response workflows, reduce response times, and minimize the impact of cybersecurity incidents.
• Do not miss the opportunity to leverage automating incident response and strengthening your organization’s cyber resilience.

13:35

The challenges posed by shadow IT and its impact on the visibility and control of assets are getting bigger.
• The risks associated with unauthorized IT deployments and the potential consequences for organizational security are neglected too often.
• Develop strategy for identifying and mitigating shadow IT risks as well as for enhancing the visibility and control of  your organization’s assets.
• Don’t let shadow IT compromise your organization’s security. Don’t play dead. Join us on this session to gain actionable insights into managing shadow IT and turning it to official IT. This will strengthen your overall cybersecurity posture and make you sleep well at night.

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Juan Diego Nocua Gualdron

CISO
Doctors Without Borders Netherlands

Alain De Maght

CISO
SPF Interieur - FOD Binnenlandse Zaken

Sümeyra Arda Çirpili

Cyber Security Project Manager
Rabobank

14:10

Do you think all hackers are experts? Wrong!
Learn about the rising threat posed by lower-skilled threat actors leveraging quantity over sophistication.
• Understand the tactics employed by these threat actors and the impact of their attacks on organizations of all sizes.
• After this session you will be equipped with the knowledge and tools needed to defend against such threat actors and minimize the risk of successful cyberattacks.

14:30

Coffee Break & 1-1 meetings

15:00

• Discover new challenges of remote work and the implications for organizational cybersecurity.
Find out what are the missing steps to address the remote workforce security in distributed digital landscape.
• If you haven’t aready, implement necessary security measures to protect remote workers and valuable corporate data.
• Attend this session to learn how to secure your remote workforce and mitigate the risks associated with distributed endpoints.

15:25

98% of organizations have experienced a breach via a third-party. This talk will explore the challenges of integrating and managing third-party services in today’s SaaS-dominated environment. We will discuss practical strategies for effective due diligence, overcoming false security assurances, questionnaire exchanges and fairy tales often provided by vendor documentation. We are going to look forward to how the evolving regulatory requirements are shaping this domain. The session aims to arm CISOs and business leaders with actionable insights for enhancing third-party risk management, ensuring both operational resilience and compliance.

  • Due Diligence Realities: Examine the challenges and limitations of current due diligence practices in revealing true third-party risks and the steps to enhance the process.
  • Lifecycle Management: Strategies for managing the lifecycle of third-party relationships, from onboarding to offboarding, to prevent security breaches despite vendor security assurances.

Impact of Regulations: Analyze how recent regulatory changes are reshaping organizational strategies for third-party risk management and what measures can be taken to comply.

Zsolt Fabian

Group Cybersecurity Lead
Byborg Enterprises

15:50

  • Is your team stretched amongst dozens of various security tools and services?
    • Learn the benefits of integrated cybersecurity solutions and how they can streamline operations, enhance visibility, and improve threat detection and response capabilities.
    • Earn your team’s time and nerves. Simplify your cybersecurity infrastructure and maximize efficiency by consolidating tools and technologies under a single, comprehensive platform.
    • Don’t miss this session and discover the advantages of tools’ consolidation, and learn how to optimize your cybersecurity operations.

16:10

Leg Stretcher

16:15

  • Leveraging Cloud Technologies: Explore the critical role of cloud technologies in digital transformation and the unique security challenges they introduce.
  • Multi-Cloud Security Strategies: Understand the security implications of adopting multi-cloud environments and discover effective strategies to safeguard them.
  • Ensuring a Secure Digital Transformation: Gain practical insights into securing your organization’s digital transformation journey, minimizing risks, and maximizing cloud benefits.

Roelof Kroon

CISO
Alfen

Alan Lucas

CISO
Homefashion Group B.V.

Jean-Yves Mathieu

CISO
Banque Internationale à Luxembourg

Rogier Psthuma

CISO
KIWA N.V.

16:50

The Digital Operational Resilience Act is a EU regulation that financial institutions have to comply with by 17 January 2025. The ideas behind this act are sound and reasonable, but when it comes to implementation, many challenges come up. The journey of a CISO navigating an organization towards compliance is tricky. This presentation will focus on a some of these challenges, and it will offer tips & tricks to avoid potholes and bumps:

  • Scoping the project: translating DORA lingo to business processes and IT systems in a pragmatic way
  • Principle-based articles versus rule-based standards: both are part of the regulation, but they interfere with DORA’s proportionality principle
  • Oversight by regulators: it is still unknown how regulators are going to audit compliance, but some reasonable assumptions can/must be made

Erik Frambach

CISO
Pensioenfonds Rail & Openbaar Vervoer

17:10

Book singing by