The C-Suite Editions

The most exclusive Cyber Security events in the world.

A most exclusive Gathering
Partaking are:

Stratsys

CISO

FedEx

Managing Director Information Security

Doctrin

CISO

Voyado

Head of Information Security

Quinyx

CISO

Einride

Head of Security GRC

DNB

Head of IT & Facility Management

Max Matthiessen

Information Security, Risk & Compliance

Bulls Press

CIO

Schneider electric

CISO

ABN Amro Bank

Head of Data Insights and Issue Management

Svenska Spel

CISO

Comex Electronics AB

Head of IT and Security

AXFOOD

CISO

Apotek Hjärtat

CISO

Max Matthiessen

Information Security, Risk & Compliance

Huawei Nordics & The Baltics

CTO

Creanord Oys

Director of Product Management

SEB

Infrastructure Architect Solution Expert

SPIROMANN

CTO

Sectra

Group CISO

COOR SERVICE MANAGEMENT GROUP AB

Head of IT Security

Sandvik

Compliance Officer

Ericsson

Senior Specialist

Sveriges kommuner och regioner

CISO

Eyeonid

CSO

Huawei Nordics & The Baltics

Country Manager

Volvo Construction Equipment

Ciso/Biso/cybersecurity enterprise architect

Aurobay

CISO

Kungliga Hovstaterna

CIO

Luleå komun

Chef informationssäkerhetsenheten

Consilium Safety Group

Head of Group IT

Sympa

CISO

Consilium Safety Group

CISO

Siemify

CTO

Boliden

CISO

Swedbank

Network security

Välinge Innovation AB

Global IT Director

Envirotainer

Head of It Service Operations

Kivra

Head of IT Operations

Telenor Global Services

Vice President, Security Management

Mastec AB

CIO

CramoGroup

CIO

Din Bil Sverige

CIO

ISS A/S

Head of IT

Loomis AB

CISO

Boliden

CIO

Hitta

CTO

Nackademin

CIO

Ericsson

Senior Specialist Security

Aspia AB

CIO

Region Uppsala

IT chef

SaveLend

CISO

Aspia AB

CISO

MedMera Bank AB

CISO

Skandia

IT consultant

DANX Group

CISO

Österlunds kommun

Cyber security Specialist

Elisa Polystar

CISO

Schibsted News Media

Head of cybersecurity

RISE Research Institute of Sweden

Visiting Professor Privacy Information and Cyber-Security

Truecaller

Information Security Manager

Cloud Security Alliance

President of Swedish Chapter

Nordea

Senior Security Officer

Katana

Head of Security and Compliance

Polismyndigheten

Kriminalkommisarie

Dugga AB

CIO

QD Sverige AB

CISO

Polismyndigheten

Business Developer

DataCom AB

CISO

BITS DATA i Södertälje AB

CISO, DPO

WSP Nordic

CISO

Movestic Livförsäkringar AB

Head of IT Operations

LIVS

CIO

Sveriges Kommuner och Regioner

CISO

Internationella Engelska Skolan

CISO

Skania

Cybersecurity Manager

Eriksson

Business Continuity Manager

Jonkoping University

CISO

Stockholm School of Economics

CTO

Danish Energy

CISO

AMRA Medical

CISO/Deputy CEO

Mobile Climate Control

CIO

East police district Norway

Digital Forensics & Cyber Security

SJ AB

Informationsecurityspecialist

The HCi group

CISO

Asurgent AB

Chief of Cybersecurity operation

Consilium Safety Group

CISO

Etraveli Group

Director IT Platform Technology

Etraveli Group

CTO

Getswish

Head of Internal IT & Security

Leaseright

CIO

PBab SE

CISO

Falu Energi & Vatten AB

IT Ansvarig

Inriver AB

Inriver AB

FRENDA

CTO

ClearOn

IT Security Manager

Strivo

Head of IT/CTO

Asurgent AB

Technical Security Advisor

Olink

CISO

FRENDA

CISO

Scania Group

Security Product Manager

Bravida

CISO

Strivo

Backoffice CISO

Ahum

CISO

Alrik

CTO

Alleima AB

Manager GRC, Digital Security

Entercard Group AB

Information Security Risk Specialist

Pbab SE

Information Security Manager

Savelend Group AB

COO/CIO

LommisPay

Technical and security Engineer

Asurgent AB

Technical Security Advisor

Pedab

CTO

Apoteket AB

Head of Information

Benify Group

Information Security Specialist

Nasdaq

Senior Security Manager

Mercur Solutions AB

CIO / CISO

Epiroc AB

Information Security Specialist

Stora enso

Head of Information & Cyber Security

Max Matthiessen

CIO/Group CEO

ATG

Information Security Manager

SPP

CISO

Qliro AB

IT Security Specialist

EDISEN SWEDEN AB

Head od IT - EMEA

H&M

Cyber Security Specialist

RISE RESEARCH INSTITUTES OF SWEDEN

Coordinator of the Swedish National Cybersecurity Node

Alfa eCare AB

CISO

Earlybird

CIO

RISE RESEARCH INSTITUTES OF SWEDEN

Director of Cybersecurity Unit

Sveriges Kommuner och Regioner

Cybersäkerhetsstrateg

Lumera

Head of IT

Lumera

CISO

Clear on

CTO

Anticimex

Head of IT

Handelsbanken

CIO

SEB

Threat intelligence | Information security

Axfood

IT Security Expert

UC AB

IT Security Manager

SVT (Sveriges Television)

Head of Distribution and Infrastructure

Matercard

Vice President Cyber and Intelligence Solutions

ICA Sverige AB

CIO

NWT Gruppen AB

CIO / CISO

Oatly

CIO & Executive Vice President Business Tech

Extenda Retail

Director of IT & IS

Gävle Energi AB

CISO

Ericsson

CISO

Brunel International

CISO

H&M

CISO

Axel Johnson International AB

CIO

DataCom

Head Of Operations

Diri AS

CCO

Ericsson

Business Continuity Manager for Group Functions

Aurobay

CISO

ELA Analytics AS

Chief Technology Officer

JM

CISO

Ålands Telekommunikation Ab

CIO

Black Nights Film Festival

Head of IT

BITS DATA i Södertälje AB

Security Analyst

Incertum AB

Senior Security Advisor

Viavi Solutions

Strategy Director

RISE RESEARCH INSTITUTES OF SWEDEN

Coordinator of the Swedish National Cybersecurity Node

Alfa eCare AB

CISO

Earlybird

CIO

RISE RESEARCH INSTITUTES OF SWEDEN

Director of Cybersecurity Unit

Sveriges Kommuner och Regioner

Cybersäkerhetsstrateg

Business France Nordics

Head of tech and innovation

Freespee

Cloud Security Engineer

Clearon AB

Commercial Manager IT-Operations and Security

Wallenius Wilhelmsen

IT Service and Technology Manager

Skogsstyrelsen

CISO

MFEX by Euroclear

CISO

Modular Management

CTO

Assured AB

IT Security Consultant

Estonian Tax and Customs

CISO

Handelsbanken

Head of development transaction banking

Vattenfall

Chief Information Security Officer

Arbetsförmedlingen

IT-Direktör (CIO)

Pysslingens Förskolor och Skolor AB

CISO

Camfil

Chief Information Officer

Health Solutions AB

CIO

ABN AMRO BANK N.V.

Global Chief Information Security Officer

ING Bank

Cloud Security Manager

ENISA

Cybersecurity Officer

Booking.com

Program Leader

Uber

Western and Southern Europe Security Specialist

Europol

Cybersecurity Evangelist

Mollie

Head of Security Operations

Coosto

CISO & DPO

Nexpay

CISO

East police district Norway

Digital Forensics & Cyber Security

LKQ Europe

Information Security Manager

Alfen

Corporate Information Security Officer

Nobian

Executive Subject Matter Expert - Cyber Security IT/OT

Western Switzerland (RC3) at State of Geneve

Head Regional Cyber Competence Centres

Exact

CISO

SentinelOne

Marketing

Institute for Security and Safety GmbH

Director

Tinka

CISO

Rabobank

Project and Change Manager for Chapter Security & In Control

Trivium Packaging

Senior Cloud Platform Engineer

Stichting BKR

CIO

Currence iDEAL

Head of Information Security

Noot

CIO & CISO

Takeshape B.V.

CISO

Municipalitt Alkmaar

CIO

NNEK B.V.

CIO

Nexpay

Information systems manager (ISM)

Status Plus

CIO

expondo GmbH

Chief Technology and Product Officer

Embassy of Israel

Trade Officer

Embassy of Israel

Economic Attaché

LKQ Europe

Information Security Manager - Customer Applications

BZK (Ministry of the Interior and Kingdom Relations)

CTO/CIO

RufusAI

CTO/CIO

Aegon

CISO

Philips

Head of Data Security

DLL Group

Manager Security Risk Mgmt

Kiwa N.V.

CISO

Abn amro

Domain Security Architect

RIPE NCC

CISO

Gemeente Amsterdam

Adviseur CIO Office

Intus Workforce Solutions

CTO / CPO

Stichting BKR

ICT Operations Manager

BERG Toys BV

Manager IT

Brunel International

CISO

BLST Security

Chief Revenue Oficer

Certification Courses Ltd

CISO

Synchronized

CRO

GNX

General Counsel / CISO

Currence iDEAL

Head of Security

BERG Toys B.V.

System Administrator

NN group

Information Security Officer

Stichting Studielink

CISO

Clear.bio

CISO

Clear.bio

CTO

Touch Biometrix Ltd

CIO&Founder

DOXFLOW LEGAL

Privacy Expert Certified Data Protection Officer CIPP/E

Stibbe

CISO

Oom Verzekeringen

CISO

Grey Rhino IT Solutions B.V.

Chief Information Officer

Ministry of Infrastructure and Water management

IT Security Manager

ABN AMRO Bank N.V.

Head of Data Insights and Issue Management

Mollie

SOC Manager

Daoust

CISO

NWO-I

CISO

WEngage

CISO

Modexpress

CIO

DNV Energy Systems

Business Director Digital Grid Operations & Cyber Security

EMS, a Fiserv company

Head of Information Security & Risk Management

Kyocera Document Solutions Europe

IT Compliance Specialist

Waarderingskamer

Chief Information Officer

Lavendel Consulting

CIO

Pensionfund Rail & Public Transport

CISO

Damen Shipyards

CISO

Kyocera

European Information Security Officer

Must Read Articles

  • All Post
  • Access Control
  • AI
  • Blog
  • E-crime
  • Hot
  • Phishing
CloudNordic Under Siege

August 29, 2023

Introduction In a shocking turn of events, hosting providers CloudNordic and AzeroCloud, based in Denmark, recently suffered a devastating…

Zero Trust Architecture

August 9, 2023

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating…

Load More

End of Content.

If want to know more:
Register for the Upcoming Events

Upcoming Events

20242025

What is
NEXT IT Security?

Next IT Security brings together C-Level cybersecurity decision makers for a day of expert-led discussions on the most current security challenges. This event provides an invaluable opportunity to explore the latest developments in cybersecurity.

Expert-led discussions

We invite the best and brightest in the industry to share their knowledge and insights on cybersecurity. The event is curated by our team of experts who are also speakers at the event.

Meet like-minded people

Next IT Security provides attendees with an opportunity to network with other professionals who have similar interests in cybersecurity. Attendees can also find potential employers or employees for their company.

Learn about new Trends

Next IT Security features keynote speeches from renowned speakers on hot topics such as malware and ransomware prevention and mitigation, mobile security, cloud security etc.

A day of networking

We have an abundance of networking opportunities with our break out sessions and informal round tables which allow you to meet like-minded people. You’ll never struggle for conversation again!

WHY SHOULD YOU JOIN
OUR CONFERENCE

Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.

0 +
Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking

Networking

At Next IT Security, you will have the chance to connect with hundreds of industry professionals from a wide range of sectors and areas across the Nordics

Here, you will have the opportunity to build meaningful relationships with people who have experienced similar struggles and successes in their respective fields.

Networking and forging strategic partnerships are encouraged so that you can leave the event with a wealth of valuable connections.

In the world of cybersecurity, a critical shortage of experts is increasing. Why? The stress levels are skyrocketing, CISO roles are evolving, and quantifying cyber risks remains a major challenge. But wait, there’s more! Remote work is unveiling extended workplace risks, including those posed by small but potent outsourcing firms known as 2.5 party risks. Adding to the mix, AI-based solutions are stepping into the limelight, sparking debates about their status as third-party risks or lurking internal threats. And as we open the door to Web 3.0 and blockchain, we’re met with both thrilling opportunities and complex challenges. Amid all this, safeguarding cloud infrastructure stands tall as a top priority. Welcome to the ever-evolving landscape of cybersecurity!

Agenda

08:00

Registration

08:15

Breakfast Powered by

08:45

Firestarter from Veracode

Join us for a discussion on managing and measuring security debt, focusing on key stats and trends. We will reference the “State of Software Security 2024” report by Veracode, exploring challenges, strategies, and the importance of measuring security debt.

  • Reflecting on the progress made by the application security (AppSec) community in 2024
  • Key achievements and advancements in AppSec practices and technologies
  • Current focus areas for the AppSec community in addressing security debt
  • Emerging trends and challenges in AppSec
  • Strategies for staying ahead and adapting to the evolving threat landscape

Matt Salmon

Sr Solution Architect
Veracode

09:00

Opening Keynote

In today’s dynamic business environment, outsourcing has become a budget-friendly norm. However, the rise of non-major suppliers, or “2.5 party”, presents new challenges. Join us as we delve into the intricacies of 2.5 party risk management and its role in mitigating risks in an increasingly outsourced workplace.

  • As remote work becomes more prevalent, can we apply the same risk management strategies used for major suppliers to our remote workforce? Discover why even small-scale outsourcing firms can pose substantial security threats and learn strategies to address these risks.
  • With the ongoing shift towards remote work and outsourcing, how will this impact the future of our workplaces? Will we see a surge or decline in these trends? As these changes redefine our workplaces, it’s crucial that our cybersecurity strategies evolve in tandem. Join us to explore these pressing questions and more.

Arnaud Wiehe

Managing Director Information Security at FedEx and the author of award winning “The Book On Cybersecurity” and “Emerging Tech, Emerging Threats”

09:25

Panel Discussion

  • Cyber attacks are evolving and becoming more sophisticated. As cyber threats continue to advance, cybersecurity professionals face increasing challenges in defending against a wide range of attacks, from malware to ransomware and beyond.
  • The shortage of skilled cybersecurity professionals and the risk of attrition. The scarcity of qualified cybersecurity talent, coupled with the risk of losing experienced professionals to other opportunities, poses significant obstacles for organizations seeking to protect their digital assets.
  • Approximately 3.5 million cybersecurity positions globally remain unfilled. With millions of cybersecurity roles remaining vacant worldwide, there is an urgent need for strategic workforce planning to address talent shortages and bolster organizations’ defenses against cyber threats.

Moderator: Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

Martin Karlsson

CISO
Quinyx

Jonas Nilsson

Information Security Strategist
Sweden's Municipalities and Regions

Rolf Lindby

CIO
Bulls Press

Brian O'Toole

Head of Security Engineering
Ericsson

10:00

Innovator Keynote

Welcome 2024! Another year, hopefully with no tailwinds, no macroeconomic challenges, big budgets and no security incidents. If only the life of a CISO could be that easy. Unfortunately, it isn’t!

This session will take a deep dive into the last 12 months of cyber activity across the globe, understanding the motives behind the threat actors we need to protect our businesses against. Dissecting the techniques and processes now being adopted by criminal groups to target Cloud environments to the use of Dark Artificial Intelligence. This session will also look into how security teams need to adapt and by taking a view into the potential new threats for 2024 and beyond, to understand where new priorities need to focus on.

So if you want to keep ahead of the adversary and stop the breach, this session is for you.

Zeki Turedi

CTO EMEA
CrowdStrike

10:20

Coffee break and 1-1 meetings

10:50

Firestarter from DEVO

11:00

Innovator Keynote

In today’s data-driven landscape, organizations face the dual challenge of compliance and security and at the same they are looking for ways to maximize data’s potential. By integrating end-to-end security measures, they can unlock new business opportunities while ensuring regulatory adherence.

In essence, the journey towards maximizing the value of data involves striking a balance between compliance, security, and innovation. It’s about transforming data challenges into opportunities, where regulatory adherence and data security serve as catalysts for growth and innovation.

Closing Insights two Real-Life Cases Demonstrate Profitability through Privacy by Design but also how this can play a part as the Vital Role of Securing Production Data for Test and Development Success.

Erik Norgren

Information & Data Security specialist
OpenText Cybersecurity

11:25

Best Practise Keynote

As AI-based solutions become increasingly integral to our business operations, the threat landscape evolves in tandem, potentially outpacing our current defenses. This session underscores the critical role of supervision and governance in safely and effectively navigating the AI journey were we will address challenges with integrity across the data/AI lifecycle, emphasizing vigilance against potential adversarial interference in data, training, and model outcomes. In addition, we will cover the need for ethical AI practices and avoidance of algorithmic bias, the necessity for AI applications to conform to sector-specific and regional regulations, highlight the importance of scalability to allow efficient growth as AI workloads increase, and explore the need for interoperability to avoid vendor lock-in when transitioning AI models.

Join us to acquire the tools and knowledge essential for mitigating AI risks under vigilant oversight.

Per Gustavsson

CISO,
Stratsys and Affiliate a Research Faculty,
C4I & Cyber Center GMU, US

11:50

Panel Discussion

– Involvement of new upcoming technologies in continuous monitoring for real-time threat detection in cloud environments

– Building secure configuration management and compliance because of constant evolving regulations

– Disaster recovery plans to maintain business continuity when facing current cyber threats

Moderator: Jamal Morris

Security Engineer
Tenable

Lars Ponten

CISO,
Doctrin

Martin Karlsson

CISO,
Quinyx

Anders Jared

CISO,
Bravida

Patrick Kall

Former Head of Security GRC
Einride

12:20

Firestarter from Digicert

12:20

Lunch Powered by

13:10

Innovator Keynote

Thanks to the great progress made by AI models such as LLMs and the increasing provision of standardized AI services, the application of these technologies is experiencing a real boom. However, the increasing acceptance and use of services in the corporate context also entails risks that IT security must face. Similar to the introduction of cloud services almost two decades ago, AI services are developing at a rapid pace and are being evaluated, rolled out and used by completely new user groups. The central task of security will therefore be to enable this new paradigm shift, to learn from past experiences, not to slow down the AI​​teams and thus to secure the competitive advantages that their companies can achieve. In this session you will learn how you can successfully master this balancing act.

  •       Visibility of the technologies and teams building on AI services
  •       Understanding of AI-specific risks (data leak for training data, misuse of models, costs of misuses of cloud services)
  •       Parallels to the cloud:  Innovation is only possible if it is not unnecessarily

Fredrik Karbing

Cybersecurity Evangelist
WIZ

13:35

Panel Discussion

  • As AI development accelerates, it’s increasingly being viewed as a potential third-party risk.From the risks associated with AI-generated code, including code that is vulnerable or infringes on the producers; license or copyright, to the new risks that are emerging for LLM- based application architectures. How rapidly is this landscape evolving, and how can we keep pace? Join us as we delve into the intensifying debate surrounding the use of AI-based within development and by security teams solutions.
  • If an organization utilizes AI-based solutions from a supplier, it’s considered a third-party risk. But what rules and precautions are companies putting in place to mitigate this risk? And how does this risk change if the solution is developed in-house? Traditionally, employees are seen as potential inside threats, but should this view extend to internally developed AI programs, given their capabilities?
  • Just because a solution is AI-based doesn’t necessarily mean it’s immune to AI-based

attacks. Could our AI-based security solutions potentially become our vulnerabilities? Engage in insightful discussions within the CISO community about AI’s role in the risk landscape and understand the importance of assessing the security implications of integrating AI-based solutions.

Andrew Winberg

Head of Information Security
Voyado

Sofia Staaf Frederiksen

Head of Information Security
Apoteket AB

Magnus Carling

CISO
Stena AB

Bjorn Johren

CISO
Max Matthiessen

Lucas von Stockhausen

Senior Director of Security Engineering
Synopsys

14:10

Innovator Keynote

Our digital world is a counterpart to our physical reality. While we have been adapting facilities for the physically challenged for years, we seem to have forgotten about those vulnerable in our digital transformations. Size of the font isn’t enough anymore and we pushed technical security controls without consideration for those who are digitally vulnerable. We assumed everyone had a smartphone or could go through the multitude of questions while trying to get through to a customer services advisor while digital vulnerabilities can affect any of us and come in many shapes and forms. We forgot that just like in real life, people need each other’s help. In this session we will look at how we can add inclusion and compassion to our cyber driven identity flows and balance security with accessibility for those challenged. Inclusive security is omni-channeled, connected and adaptive.

Marcin Zimny

ForgeRock | PingIdentity

14:30

Firestarter from Darktrace

AI is proving to increase productivity and augment humans in new ways. To seize these opportunities, organizations must be aware of and manage its risks. That includes understanding how it has changed the threat landscape and the security concerns that come with it. In this session we’ll cover how applying Self-Learning AI across your organization’s digital environment will help your security team prevent, detect, respond, and heal from incidents, including those augmented by generative AI.

14:35

Coffee Break & 1-1 meetings

15:05

Innovator Keynote

Cybersecurity risk largely stems from people and their actions, with the human element accounting for around 80% of breaches. Therefore, the best way to reduce risk is to reduce the frequency of risky behaviours or increase the frequency of positive, secure habits. Easier said than done?

In this talk, Fanny and Maxime will reveal the most common mistakes people make when trying to influence others’ actions. They will then introduce a simple model that anyone in security can use to design for any behaviour they want to encourage or discourage. Drawing from their experience leading security behaviour and culture change programs in companies such as SEB, H&M Group and Avanza, they will bring real-life examples of applying this model to shape behaviours such as reporting security incidents or using approved cloud platforms. Participants will walk away with a practical tool they can use to tackle human risk in their organisation.

Maxime Cartier

Head of Human Risk
Hoxhunt

Fanny Lampel

Security Awareness and
Competence Specialist
SEB

15:30

FireSide Chat

Web 3.0 is the next generation of the web, where data is decentralized, intelligent, and semantic. This new web promises to empower users with more control, privacy, and innovation, but also poses new challenges and risks for cybersecurity. Learn how blockchain technology can provide solutions for securing data, identity, and transactions in Web 3.0, as well as the emerging threats and vulnerabilities that need to be addressed.

Moderator:Kevin Breuer

Security Engineer
LogRhythm

Arnaud Wiehe

Managing Director Information Security,
FedEx

Tiago Teles

Head of Data Insights and Issue Management
ABN AMRO Bank

16:05

Frederick the Great once said “He who attempts to defend everything, defends nothing.”

When risks increase year over year, and security budgets can’t keep pace, we need to become intelligent in understanding what & where our risks are and how to best treat them.

Malte Panahi

Mimecast

16:25

Closing Keynote

As we commemorate the 30th anniversary of the Chief Information Security Officer role, we pay tribute to Steve Katz, the trailblazer who served as the world's first CISO at Citibank. In this session, we delve into the essence of cybersecurity leadership, focusing on integrating cybersecurity knowledge, strategic leadership, and cultivating a security-centric organizational culture.

  • The Evolution of the CISO Role: Transitioning from operational to strategic leadership, emphasizing the importance of cybersecurity knowledge in shaping organizational culture and decision-making processes.
  • Cultivating a Security-Centric Culture: Strategies for embedding cybersecurity awareness into the organizational DNA, thereby enhancing the collective security posture.
  • Strategic Collaborations for Innovation: Exploring the dynamics of forging and sustaining partnerships with cybersecurity solution providers, focusing on mutual learning and innovation.
  • Sustaining Strategic Partnerships: Practical approaches for maintaining and enriching partnerships over time, ensuring they adapt to evolving cybersecurity landscapes and organizational needs.

Roger Ison-Haug

CISO
StormGeo

16:50

Leg stretcher and book signing by Tiago Teles and Arnaud Wiehe - the author of award winning “The Book On Cybersecurity” and “Emerging Tech, Emerging Threats”

Arnaud Wiehe

Managing Director Information Security,
FedEx

Tiago Teles

Head of Data Insights and Issue Management
ABN AMRO Bank

18:00

Networking Dinner Cruise Powered by

The Grand Hôtel in Stockholm has been home to celebrities, high-profile events and everyday bon-vivants since 1874. Situated in the best waterfront location imaginable, the hotel overlooks the Royal Palace and Gamla Stan, Stockholm’s old town. 

Highly Exclusive. Operakällaren’s name dates back to 1787 when it was situated in the cellar under Gustav III’s opera house. History permeates the atmosphere in this heritage property, the most prestigious meeting place in Stockholm, is a house filled with opportunities, inspiration and fantastic networking.

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event