Welcome to the Next IT Security – March Edition, the premier event where cybersecurity leaders and innovators converge to address the most pressing issues in the field. Our agenda is packed with insightful discussions and strategies to tackle the latest challenges and opportunities in cybersecurity.

Strategic Alliances and Partnerships in Cybersecurity: Strengthening Defenses Through Collaboration
Explore how forming strategic alliances and partnerships, such as threat intelligence sharing platforms and managed security services, can significantly enhance your organization’s defense capabilities. Learn how collaboration is crucial for effectively combating sophisticated cyber threats.

Understanding ROI in Cybersecurity: Preventative Investment and Risk Mitigation
Discover the value of investing in cybersecurity through comprehensive training programs and advanced threat detection systems. Understand how preventative measures and risk mitigation contribute to a robust ROI by reducing the risk of costly breaches and ensuring long-term resilience.

Emerging Tech, Emerging Threats: How to Keep Up with Constant Updates and Improvements
Stay ahead of the curve with insights into adopting cutting-edge threat detection tools, automated response systems, and continuous learning platforms. This session will guide you on maintaining a strong cybersecurity posture amidst rapid technological advancements.

Dark Web and Cybercrime: Uncovering the Hidden Realities
Delve into the hidden world of the dark web and its impact on cybercrime. Learn how dark web monitoring services and advanced threat intelligence solutions can provide essential insights and protection against these elusive threats.

Empower Women in Cybersecurity: Bridging the Gender Gap
Address the gender gap in the cybersecurity industry by promoting diversity and empowering women to lead. Explore initiatives and strategies that foster an inclusive environment and leverage diverse perspectives for more effective cybersecurity solutions.

Strengthen Cloud Security in Modern Environments
Focus on safeguarding cloud infrastructures by addressing challenges such as data loss prevention, shared vulnerabilities, and maintaining visibility. Gain practical insights into innovative strategies and solutions for securing your cloud environment and ensuring data integrity.

Next IT Security aims to provide our attendees with cutting-edge insights and actionable strategies to stay ahead in the ever-evolving cybersecurity landscape.

Agenda March 2025

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

08:55

Firestarter by DigiCert

09:00

We will open the conference with this neglected topic – Dark Web. It remains a critical enabler of cybercrime, facilitating the trade of stolen data, malware, and illegal services. Therefore CISOs must understand the operational dynamics of the Dark Web, where sophisticated threat actors collaborate and exchange tactics. They even order ransomware attacks using Dark Web forums to distribute ransomware-as-a-service (RaaS). 

On the other side there are advanced tools and Threat Intelligence platforms that detect and monitor these hidden activities. 

Learn how to integrate these tools into your cybersecurity strategy. Learn how to develop a threat intelligence program that includes Dark Web surveillance, partnership with law enforcement, and real-time threat feeds to enhance your organization’s resilience against these hidden threats.

Jason Lowder

Cyber Assistant Legal Attaché
Federal Bureau of Investigation Sweden

09:25

Cyber threats are evolving rapidly, necessitating strategic alliances among Nordic organizations to bolster defenses. Many data breaches result in tons of compromised sensitive data sold on the Dark Web.

What can significantly improve detection and response capabilities is – Collaborative defense strategy, such as sharing threat intelligence and pooling cybersecurity resources. Leveraging regulations like the NIS2 Directive ensures cross-border cooperation and compliance.

Learn how forming alliances with other organizations, cybersecurity vendors, and government entities can provide early warnings and coordinated responses to cyber incidents. You will also find out how to create or join cybersecurity alliances to share intelligence, resources, and best practices to improve collective defense capabilities and compliance with regulations.

Moderator: Michael Adjei

Director Systems Engineering
Illumio

Nithin ‎Krishna

Head of Cyber Security
Jeppesen, a Boeing Company

Dennie Karlsson

Group CISO and Head of Risk Management
Dustin

Tom Kjølhamar

Head of IT security
Moelven Industrier

Magnus Carling

CISO
Stena AB

10:00

In today’s rapidly evolving cyber threat landscape, traditional vulnerability management approaches often fall short in providing comprehensive protection.

This keynote will explore “The Future of Vulnerability Management: XM Cyber’s Digital Twin Innovation,” highlighting how XM Cyber’s groundbreaking Digital Twin technology redefines the way organizations identify, prioritize, and remediate exposures. Attendees will gain insights into the dynamic modeling of their digital environments, enabling proactive threat detection and streamlined security strategies.

Don’t miss the opportunity to learn how integrating Digital Twin capabilities can not only bolster your cybersecurity posture but also transform vulnerability management into a more effective security approach.

Dan Anconina

CISO
XM Cyber

10:20

Coffee break and 1-1 meetings

10:50

Firestarter YesWeHack

10:55

Join Bugcrowd’s customer David Karlsson, Head of Security at Storytel, as he explores unlocking the collective ingenuity of hackers to stay one step ahead of emerging cyber threats. He will be joined on stage by Alexander Pick, independent Security Researcher on the Bugcrowd platform. This fireside chat style case study will delve into the intricacies of technology in crowdsourced security, collaboration with ethical hackers, and the importance of a shift left mindset for product security.

David Karlsson

Head of Security
Storytel

Alexander Pick

Security Researcher

11:15

As organizations increasingly rely on cloud services they must tackle issues related to shared responsibility models, misconfigurations, insufficient identity and access management (IAM) and lack of visibility into cloud workloads. Supply chain attacks further illustrated the danger of lateral movement and privilege escalation in hybrid cloud environments, requiring a more sophisticated approach to cloud security.

You must attend this discussion and hear first hand experience on implementing robust cloud security practices, such as Zero Trust Architecture, micro-segmentation, continuous monitoring, and cloud-native security tools. Learn how to conduct a cloud security audit to identify vulnerabilities and potential misconfigurations. How to leverage cloud-native security services provided by cloud vendors to gain deep visibility and control.

Moderator: Fanny Storm

Enterprise Account Executive
WIZ

Johan Tempelman

CISO
Teamtailor

Magnus Clarving

CISO
ATG

Mario Beccia

Deputy CIO for Cybersecurity
NATO

Linda Avad

CISO
OKQ8

11:50

  • Understand how to practically reduce your attack surface while reducing costs and achieving payback within 6 months
  • See how microsegmentation accelerates incident response, simplifies ongoing operations, and compares to traditional firewall segmentation
  • Get clear insights into the time, effort, and investment required to successfully deliver and maintain microsegmentation in your organisation

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

12:10

Firestarter by KnowBe4

12:10

Lunch Break

13:10

Firestarter Zerto

13:15

In an era where cyber threats transcend borders, NATO’s approach to cybersecurity offers valuable insights into how strategic alliances can serve as powerful multipliers of defense capabilities. 

Join us for an exclusive session led by a NATO cybersecurity official, who will share their experiences and lessons learned from coordinating cybersecurity efforts among member states.

This session will delve into NATO’s approach, which emphasizes collaborative defense, real-time intelligence sharing, and joint incident response mechanisms to counter sophisticated cyber adversaries.

The discussion will cover:

  • NATO’s Cyber Defense practise
  • The Role of Collective Cyber Deterrence
  • Leveraging Shared Resources and Expertise

Why Attend: In this era of global cyber instability, understanding NATO’s approach to cybersecurity can provide a strategic advantage for organizations in the Nordics. By adopting similar collaborative models, CISOs and IT leaders can enhance their organization’s defense capabilities. This session is a unique opportunity to gain firsthand knowledge from one of the world’s leading cybersecurity coalitions and apply these insights to your own strategic initiatives.

Mario Beccia

Deputy CIO for Cybersecurity
NATO

13:40

In today’s digital world, identity fraud is a growing threat, with increasingly sophisticated tactics challenging traditional security measures. The “3D Approach to Identity Fraud” introduces a holistic framework—Detection, Decision, and Defense—designed to help organizations understand, manage, and mitigate these risks. This approach integrates cutting-edge detection methods, risk-based decision-making, and adaptive defenses to safeguard digital identities effectively.”

Vinay Dabas

Senior Solution Architect
Ping Identity

14:05

The conference concludes with a forward-looking keynote that explores the dual impact of rapid technological growth on cybersecurity and the need for continuous adaptation, learning, and strategic partnerships to maintain a resilient defense posture.

The rapid pace of technological evolution is transforming the cybersecurity landscape, presenting both unprecedented opportunities and challenges. The integration of 5G, quantum computing, AI, and IoT into business operations brings new vulnerabilities. For CISOs and IT leaders, staying ahead of technological evolution is critical to prevent sophisticated attacks and ensure resilience. Embracing these technological advancements with a proactive cybersecurity strategy can provide significant competitive advantages. Find out about strategic priorities to tackle future cyber threats collaboratively.

Attend this keynote to learn how to develop a long-term cybersecurity roadmap that incorporates emerging technologies and their potential risks. Hear this  final thoughts from our expert and get your takeaway to implement and advocate for stronger, more resilient cybersecurity practices in your organization.

Viktor Polic

CISO
ILO a UN agency

14:30

Most security testing today is purely tactical – we find vulnerabilities and sometimes fix them. But what if a comprehensive approach to security testing could enable organizations to aggressively innovate and take full advantage of business opportunities? Join us to discuss:

  • Focus on what matters most- Internet-facing, mission critical assets
  • Not all PTaaS is created equal- how to get the most from PTaaS
  • Risk-based vulnerability management that works
  • Maximizing testing value- pattern discovery, remediation and reporting

Wade Lance

Global Field CISO
Synack

14:55

Firestarter GitLab

15:00

Coffee Break & 1-1 meetings

15:30

Round Table Discussions

  • Emerging Tech, Emerging Threats: Staying Ahead in a Rapidly Evolving Landscape
  • ROI for Cybersecurity: Essential Investment or Costly Expense?

Round table moderators:

Jörgen Ottoson

CISO&DPO
BITS DATA i Södertälje AB

Sanjay Kumar

PhD, CTI
Landis+Gyr

Henrik Thomsson

Head of IT Security
Lidl Sverige

Ola Ponten

CISO
SCA

Sebastian Rosendahl

CISO
Consilium Safety Group

Elena Marzi Tornblad

Cybersecurity Strategy & Research Officer
RISE

Elpidoforos Arapantonis

Senior Security Officer
Vattenfall

Scott Melnyk

CISO
Internationella Engelska Skolan

Rolf Lindby

CISO
Bulls Press

Johan Åtting

CISO
Sectra AB

Jakob Stenstave

CISO
TechMahindra

Martin Karlsson

CISO
AP3 (Tredje AP fonden)

16:30

A short walk from Grand Hotel to Cruise.

17:00

Firestarter ThreatLocker

17:05

This session provides concrete actions for attracting and retaining diverse talent, based on the results of a new survey. Moona Ederveen-Schneider addresses how inclusive leadership and allyship can make all the difference in closing the talent gap and helping our societies not just be secure, but prosper as well. Covering DEI from the perspective of age, neurology, sexuality, ethnicity and nationality, gender, and non-traditional pathways into IT security, this closing keynote will leave you motivated and equipped to be a more inclusive leader or ally.

Moona Ederveen

Principal Consultant
ISF

17:30

Book signing by Magnus Carling, first 2 parts of Monster trilogy (sequel of the Svart Kod trilogy)

Magnus Carling

CISO
Stena AB

18:00

Networking Dinner Cruise

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event