The C-Suite Edition
This community event is capped at 300 participants.
15 September 2021
Speakers are what makes our event stand out.
We frequently update our speaker list, subscribe to our event announcements and stay updated!

Svante Nygren
CISO and Head of unit, Information and Cyber Security at Swedish National Electric Grid Corporation

Jörgen Olofsson
CISO at Praktikertjänst

Anwar Sulaiman
Data Protection Officer at SAAB

Madelaine Kempe
Head of IT Risk and Security at SAAB

Elpidoforos Arapantoni
Solution Architect at Volvo Cars

Helen Holst
CIO at Solna stad

Aki Tauriainen
Head of Unit (NCSA-FI) at National Cyber Security Centre, Finland

Göran Kördel
CIO at Boliden

Rune Skarphagen

Maria Wester
CIO at Svevia

Jimmi Ernberg
CISO at Swedish Match

Anne Hännikäinen
CISO at Fintraffic

Terje Aleksander Fjeldvær
SVP – Head of Financial Cyber Crime Center (FC3) at DNB Bank

Daniel Ekelöf
Head of Distribution and Cybersecurity at SVT

Emma Dahlbäck

Evangelos Ouzounis
Head of Policy Development and Implementation Unit at European Network Information Security Agency (ENISA)

Eva Throne-Holst
Information Security Officer, Nordnet Bank

Filip Johnssén
Data Protection Officer, Klarna

Geir Arild Engh-Hellesvik
CISO at Vy

Christer Eliasi-Swahn
CTO at DBT Capital

Dr. Rytis Rainys
Director at National Cyber Security Centre, Lithuania

Alex Jaranka
Chief Medical Information Officer at Legevisitten AB (Capio)

Oscar Wide
CISO at Green Cargo

Dr. Visa Honkanen
Chief Digital Officer at Helsinki University Hospital (HUS)

Emma Johansson
Ansvarig säkerhetsfrågor / Senior Advisor Security, Energisystem / Energy System at Energiföretagen Sverige / Swedenergy)

Kristina Blomqvist
Group Operational Technology Security Officer at Vattenfall

Margrete Raaum
CEO at KraftCERT/Norwegian Energy Sector CERT at Board Member of Forum of Incident Response and Security Teams (FIRST)

Sebastian Kemi
Head of Cybersecurity & Emerging Tech at Sandvik

Robert Valkama
Cyber Security Manager at Fortum

Anders Åhlgren
Informations säkerhetsansvarig – CISO at Jönköping Energi

Titti Norlin
Sektionschef at Swedish Energy Agency

Brian O’Toole
Head of Digital Services Security Centre at Ericsson

Milad Aslaner

Yochai Corem

Jelle Wieringa
Security Advocate at KnowBe4

Vanja Cvetojevic
Assurance Officer and leader for process forum for Accreditation process at SAAB

Nick Sears
VP, SASE Solutions at Lookout

Surinder Singh Rait
Head of IT Security Assurance at Ericsson

Edwin Weijdema

Patrick McBride
Chief Marketing Officer at Beyond Identity
The C-Suite Edition
15 September 2021
8:00
KICK OFF
8:10
Networking Village + (1-1) Meetings
8:50
Sweden is stepping up after seeing other countries being under attack within the power sector!
“In Conversation With”
Security Requirements/establishing trust in the era of increased information sharing within the energy sector
- What are the requirements in regards to the era of increased information sharing from your perspective?
- What are the consequences if the requirements are not met?

Svante Nygren
9:05
Expert Panel 1 - Doing necessary changes is optimal, too much changes will lead us to bigger unknown!
- Are new policies necessary for the healthcare sector?
- How do we balance between the necessary changes and the unnecessary changes?
- Are we prepared for the post covid situation? What will be the consequences of making too many changes within healthcare?
- Cyber threats in a rapidly changing industry – from your local Vet to Online services -and how do we deal with them?

Malcolm Larri
Host, NITS C-Suite Edition

Emma Dahlbäck
CIO at Anicura Group

Dr. Visa Honkanen
Chief Digital Officer at Helsinki University Hospital (HUS)

Jörgen Olofsson
CISO at Praktikertjänst

Alex Jaranka
Chief Medical Information Officer at Legevisitten AB (Capio)

Gary Cox
CISSP, EMEA Product Specialist Manager at Infoblox
9:37
Untold truth about the threat landscape and what you can do about it - Keynote 1
Every day we hear that the threat landscape has evolved and that organizations need to make changes to their security solutions.
- But what has really evolved?
- What changes do we actually require?
In this presentation, we are going to dissect what is happening in real life and what changes are critical versus nice to have.

Milad Aslaner
10:10
Exclusive Toolkit to keep you secure in 2021 and beyond
10:10
Latest DDoS trends and the rise of ransom-driven attacks
DDoS attacks have dominated the charts in terms of frequency, sophistication, and geo-distribution over the past year. Ransom DDoS attacks — that, unlike ransomware attacks, do not even require the hacker to access an organization’s internal systems before they can be carried out — are also surging lately. While there are no signs of DDoS attacks going away anytime soon, how do organizations ensure that their Internet assets are protected against threats of any size or kind? In this presentation, you’ll learn about:
- Key Q2 2021 DDoS attack trends;
- Ransom DDoS threats — and what you can do if you are affected; and
- Steps organizations can take to make the impact of DDoS attacks a thing of the past.

Vivek Ganti
Security Product Marketing at Cloudflare
10:10
Harnessing the crowd. Why have 1 tester behind a desk when you can utilise 1,500 virtually?
In this session you will learn:
- Why the current model of penetration testing is dead.
- How security assessments can be tailored to an ever changing network.
- How to show ROI with ongoing program performance metrics based on Synack proprietary Attacker Resistance Score benchmarking.

Matthew West
Solutions Architect Belelux and Nordics at Synack
10:30
Threat Intelligence to Proactively Enrich your Cyber Security Strategy
- Few steps to illustrate how you can build a Threat Intelligence Program to protect your organization.
- Protect your digital assets on a continuous and autonomous whilst monitoring the external attack surface.
- Understand how you can safeguard your organization against phishing, fraud, brand violation, vulnerabilities, data leakage and more

Yochai Corem
10:30
Strengthening your Digital Resilience!
We all go through the Digital Transformation journey at our own pace. The pandemic, however, accelerated the journey for most organizations. Instead of the allotted time in years, it was done in months! This was an eye-opener for many on how dependent their core business processes are on digital technology in the event of disruption. Digital resilience defines your capabilities for survival and forward evolution, considering that change is the only constant in a fluid, super-connected digital environment. The question to ask is, are you actively strengthening resilience for both business processes, existing digital infrastructure and new infrastructure? Anticipating and responding to challenges ahead, learning from things that have (almost) gone wrong and evolving your resilience — Digital resilience, therefore, represents a fundamental change in the way we understand how digital technology, risk and opportunity are tied together. More secure does not mean more resilient!

Edwin Weijdema
10:50
A Zero Trust approach to cloud security & data protection Why Endpoint to Cloud security is essential

Nick Sears
VP, SASE Solutions at Lookout
10:50
How The World’s Largest Organisations Unleash the Power of Secure Data
Join Eliano as he discusses:
- How to de-identify sensitive data anywhere for operational, analytical and AI purposes at rest, in transit or in use.
- The four step data protection process: discover, secure, protect, EMPOWER.
- Use case: how a real organization accelerated time to market for data analytics, AI, and machine learning use cases that increased revenue and improved customer experience.

Eliano Marques
Chief Data & AI Officer at Protegrity
11:10
Expert Panel 2 - How to assess systems and ensure compliance with all applicable regulations
- How important is it to schedule internal audits in order to be proactive and avoid attacks?
- What will be the consequences if organisations are not on track with changing laws and regulations?
- Assessing compliance with applicable legislation.

Malcolm Larri
Host, NITS C-Suite Edition

Rune Skarphagen

Sven-Olof Wiklund

Surinder Singh Rait
Head of IT Security Assurance at Ericsson
11:43
You know that having a healthy and functioning security culture within your organization is key to avoiding a costly data breach. With social engineering and phishing attacks on the rise, getting buy-in from your organization is key for an effective security posture. - Keynote 2
Here Jelle Wieringa, Security Advocate at KnowBe4, helps you to better understand what it takes to build a successful security culture.
Get actionable insights on:
- How to communicate on cybersecurity effectively
- How to position the value proposition
- What a Security Culture is, and how to build one


Jelle Wieringa
Security Advocate at KnowBe4
12:15
Expert Panel 3 - The challenge of securing Fintech, discussion continues
- Is the current model for regulation inhibiting free competition and the development of attractive financial services?
- Would a system of certifications and shared security solutions for the financial market increase both security and agility in business development?
- Are there security solutions that would provide even higher levels of security if shared between financial institutions?
- Immediate payments and how the end customers use of third party applications affects the banks work to prevent digital fraud?

Malcolm Larri
Host, NITS C-Suite Edition

Evangelos Ouzounis
Head of Policy Development and Implementation Unit at European Network Information Security Agency (ENISA)

Filip Johnssén

Terje Aleksander Fjeldvær
SVP – Head of Financial Cyber Crime Center (FC3) at DNB Bank

Christer Eliasi-Swahn
CTO at DBT Capital
12:45
Networking Village + (1-1) Meetings
13:05
How to present cyber security to the board. – What to do when the board asks if your cyber security is good enough - In Conversation With
Manufacturing 4.0, Industrial IoT, connected machines and sensors opens up for digital automation in the production space. Connecting everything in an industrial environment also creates new risks and threats. How to present cyber security to the board. The presentation elaborates around the following topics:
- Where do we have the biggest risks and what is the right level of risk?
- How do you know what cyber security actions are enough?
- How to plan and measure security in an industrial context. Awareness, protection, detection or response.

Göran Kördel
CIO at Boliden
13:23
Expert Panel 4 - Think Global but Act Local – a practical approach by Nordic energy sector to approach cybersecurity risks.
The current suggestion of a new Guideline on sector-specific rules for cybersecurity aspects of cross-border electricity flows is typified by trends such as increased cyber risk, growing pressure from corporate and regulators to implement security measures. These trends continue to put pressure on the energy sector to both accelerate their use of technology as well as find innovative and creative ways to scale those solutions across multiple assets and sites in the EU. This combination of factors has led what we call a ‘Think Global but Act Local’ approach to security. In essence, security actions that require a top-down approach. This approach provides multiple benefits to the energy company such as:
- The importance of combining people, process, and technology.
- Bridges and leverages the best of both IT skills and OT insight.
- Provides operators with a way to take action as opposed to just alerting cyberattacks.

Emma Johansson
Ansvarig säkerhetsfrågor / Senior Advisor Security, Energisystem / Energy System at Energiföretagen Sverige / Swedenergy)

Kristina Blomqvist
Group Operational Technology Security Officer at Vattenfall

Margrete Raaum
CEO at KraftCERT/Norwegian Energy Sector CERT at Board Member of Forum of Incident Response and Security Teams (FIRST)

Anders Åhlgren
Informationssäkerhetsansvarig – CISO at Jönköping Energi

Robert Valkama
Cyber Security Manager at Fortum

Titti Norlin
Sektionschef at Swedish Energy Agency
13:55
Expert Panel 5 - Different but same challenge within the transport sector when it comes to risk management
- What is the major challenge at this moment in time within the transport industry?
- Although we know personnel have been dealing with risk management when it comes to physical logistics, e.g: natural calamity, accidents etc. What are the challenges when transports are connected to the internet and how is it vulnerable to the attackers?
- Electric vehicle charging infrastructures. Shall we cyber-secure our infrastructures as much as our vehicles?

Malcolm Larri
Host, NITS C-Suite Edition

Anne Hännikäinen
CISO at Fintraffic

Vanja Cvetojevic
Assurance Officer and leader for process forum for Accreditation process at SAAB

Elpidoforos Arapantonis
Solution Architect at Volvo Cars
14:28
The Past, Present and Future of Strong Authentication - Keynote 3
Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective. Replacing passwords as an authentication factor is finally possible. While, eliminating passwords is a critical step in eliminating credential-based attacks, it is just a first step on the journey to advanced authentication and access control approaches that will be needed to achieve zero-trust.
In this talk, we will discuss:
- A brief history of authentication
- Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
- Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
- A case for continuous user authentication
- What is device risk and why is the real-time assessment of endpoint security important
- What role does strong authentication playin Zero Trust?


Patrick McBride
Chief Marketing Officer at Beyond Identity
15:00
Summary/Networking Village + (1-1) Meetings
15:15
Expert Panel 6 - Smart ways of working with digitisation & digitalisation within different Industries
- What are practical methods of digitisation and digitalisation?
- Do we understand the difference between digitisation and digitalisation?
- What’s the major threshold when it comes to digitisation and digitalisation within different industries?
- Maria, we know that you have been working on this for a very long time and you have a model, could you please share that with us?

Maria Wester
CIO at Svevia

Andy Lockhart

Daniel Ekelöf
Head of Distribution and Cybersecurity at SVT

Sebastian Kemi
Head of Cybersecurity & Emerging Tech at Sandvik

Brian O’Toole
Head of Digital Services Security Centre at Ericsson
15:47
The pandemic meets the infodemic, the biggest challenge within the public sector? - Closing In Conversation with
- What can we change with legislation? Especially EU policies!
- Risk management for classified information, how crucial is it?
- How can we mitigate these risks?

Dr. Rytis Rainys
Director at National Cyber Security Centre, Lithuania