Stockholm

March 12, 2026

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Building a Collective Defense in Nordic:
   Shared Responsibility Between Public and Private Sectors

One for All:
   Strengthening Cyber Resilience Through Regulatory    Compliance

Security Without Borders:
   Overcoming Barriers to Information Sharing

The Future of AI and Cloud Security:
   From Guidelines to Implementation

Keynotes

Tobias Wieloch

Head of Dark Web Team at Europol EC3
Passionate and resourceful Cyber Security & FinCrime leader with a trusted reputation, an influential network and a proven track record of 18+ years in law enforcement. Adept at managing large-scale cyber security programs, ensuring regulatory compliance and leading cross-functional teams to prevent financial losses & reputational damage.

Proven ability to leverage advanced technologies, communicate effectively with C-level executives, drive strategic initiatives, and oversee risk mitigation efforts in dynamic global environments.

Deividas Lis

Cyber Threat Intelligence Officer at ECB (European Central Bank)
In my current role, I navigate the complex and ever-evolving landscape of cyber threats, employing a meticulous approach to safeguard digital environments. My expertise is underpinned by a solid legal education, complemented by ongoing professional development in advanced technologies like Python.

I thrive in collaborative, high-stakes settings, having led numerous critical investigations and intelligence projects that have significantly bolstered organizational security. As I continue to deepen my technical acumen, I remain committed to contributing meaningfully to the field of cybersecurity, driven by a mission to enhance digital safety and security in our interconnected world.

Book Author

Surinder Lall

Head of Cyber Governance, Risk and Compliance at dmg media
For over two decades, Surinder has been a dynamic force in the technology world. His impressive journey is backed by a Master of Laws (LL.M.), an international business degree, and a host of top-tier cybersecurity certifications. This special blend of expertise led to him receiving the Top Innovator Award from Paramount International's CEO in 2019. His influence is felt at the highest levels, having completed a two-year term advising the UK Cabinet Office as part of the Cyber Security Advisory Board. Surinder is a sought-after speaker who energises audiences globally on topics he's passionate about: cybersecurity, diversity, and inclusion. He's a familiar face at leading universities like Maastricht University Law School, sharing his knowledge with the next generation of leaders. Following his ADHD diagnosis in 2023, Surinder has become a vocal champion for neurodiversity, launching the Neurodiversity Network to empower professionals and parents. He also established the AI Ethics and Policy Think Tank, a community-focused initiative. As a winner of the 2025 OnCon ICON Award a Honorary Founding Member of the America India Tech Council and a member of the prestigious Chief Architects Network , Surinder is recognised for his contributions. Known for his engaging personality and deep-seated belief in fairness, he is dedicated to making a tangible difference in the lives of others.

Author of
"Leading in the Age of AI"

Partners

RESERVED

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Apply for The C-Suite Edition

12th of March 2026


Welcome to the Next IT Security – Nordic Edition 2026, the region’s most exclusive gathering of cybersecurity leaders, where C-level executives, strategists, and innovators come together to address the rapidly evolving challenges shaping the Nordic digital landscape.

This year, we focus on the collective responsibility required to defend our societies, organizations, and infrastructures. As threats grow more complex and interwoven across borders, sectors, and technologies, our resilience must evolve just as rapidly.

In this edition, we explore several mission-critical themes impacting every modern security leader:

Building a Collective Defense in the Nordics

Cyber threats no longer target isolated organizations, they target entire ecosystems. Strengthening national resilience requires unprecedented cooperation between the public and private sectors. Joint defense is no longer optional; it is a strategic imperative.

One for All: Regulatory Compliance as a Resilience Driver

New frameworks and European regulations are transforming the cybersecurity landscape. Compliance is no longer just a box to tick, it is a shared responsibility that enhances collective protection and raises the security baseline for all.

Security Without Borders: Overcoming Barriers to Information Sharing

Critical intelligence often stops at organizational or jurisdictional boundaries. Breaking these barriers is essential for faster response, stronger trust, and more effective cross-border collaboration. True resilience thrives on open, secure, and trusted information exchange.

The Future of AI and Cloud Security: From Guidelines to Real Implementation

As organizations accelerate cloud adoption and integrate AI-driven processes, the gap between policy and practice becomes increasingly risky. Moving from theoretical frameworks to fully implemented, operational safeguards is the next decisive step toward secure digital transformation.

Next IT Security continues its mission to empower the Nordic cybersecurity community with clarity, collaboration, and practical insights. Our goal is to cultivate an environment where decision-makers not only understand the challenges of tomorrow but gain the tools and connections to meet them with confidence.

Welcome to Stockholm, where the future of cybersecurity is shaped today.

Agenda

08:00

Registration

08:15

Power Breakfast

Time for initial networking on the event while we are expecting the Opening Keynote.


Chapter One:

Building a Collective Defense in Nordic:

Shared Responsibility Between Public and Private Sectors

09:00

Public and Private sectors can and must build stronger resilience by sharing resources in evolving cyber threats environments. Through practical examples of public – private potential we will focus on features that this collaboration can bring to the table and why is that important nowadays.

Attendees will gain actionable insights on how to structure communication channels, align security priorities, and integrate awareness programs that foster collaboration rather than competition. The session provides a realistic roadmap for improving preparedness and accelerating joint response efforts.

Instead of relying on isolated defense mechanisms, fragmented reporting, or reactive postures, you will learn how to leverage cooperation and shared accountability to strengthen resilience, build trust, and reduce the overall risk exposure across your ecosystem.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory
INTERPOL

09:25

Organizations can move beyond simple information exchange toward actionable intelligence that strengthens collective resilience. Through real-world examples from both the public and private sectors, the discussion will highlight the importance of data context, validation, and trust when sharing cyber threat information. The session will also address the cultural and procedural barriers that often prevent effective collaboration. From fear of reputation loss to lack of unified response protocols.

Attendees will gain different perspectives on how to transform fragmented information into intelligence that supports faster, coordinated decisions.The panel will uncover how shared trust frameworks, joint playbooks, and transparent communication can elevate entire ecosystems instead of benefiting only individual entities.

Instead of treating threat information as isolated reports that sit unused in inboxes, this session will show how to turn them into actionable intelligence that drives prevention, early warning, and mutual protection across the IT Security community.

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

Sharon Larsson

CISO
Sveska Spel

Amit Sharma

Cyber Security Officer
ASR

Siegfried Moyo

Author & Director, IT Security – (Deputy CISO)
Americold Logistics, LLC

10:00

This session explores how technology providers are redefining their role in cybersecurity, not just as solution vendors, but as enablers of collaboration, trust, and intelligence exchange. It focuses on how openness, integration, and shared accountability are becoming the new standard for innovation and defense readiness.

Participants will discover how leading vendors are building frameworks that empower organizations to act faster, detect smarter, and recover stronger. By moving from isolated ownership models to connected partnerships, the industry unlocks a new level of resilience and shared value creation.

Without exposure to frameworks that enable shared intelligence and connected partnerships, organizations risk slower threat detection, fragmented defenses, and a missed opportunity to strengthen resilience across the industry.

Lucas von Stockhausen

Executive Director, Application Security Engineering Black Duck

10:25

Coffee Break & 1-1 meetings

Let’s discuss what we hear about Public & Private cooperation over a cup of coffee and explore some new opportunities with the partners of the event.


Chapter Two:

One for All!

Strengthening Cyber Resilience Through Regulatory Compliance

10:55

Modern compliance frameworks NIS2, DORA, and the upcoming Cyber Resilience Act (CRA) , standardize expectations across industries, forcing organizations to adopt minimum security baselines, structured risk management, and transparent reporting practices

These unified rules reduce ambiguity in the market, align suppliers and customers around the same obligations, and create predictable security requirements that simplify vendor selection, technology adoption, and internal decision-making.

As organizations mature under these regulations, compliance becomes more than a checklist: it reshapes market behavior, elevates security practices across entire ecosystems, and ultimately transforms baseline regulatory pressure into sustainable, long-term cyber resilience.

Tobias Ander

Manager IT Security
Försvarsmakten (Swedish Armed Forces)

11:20

Using compliance frameworks as a structured guideline transforms complex security requirements into actionable, prioritized steps and reduces uncertainty in decision-making.

Organizations gain clearer visibility, reduce operational friction, and optimize resources by aligning security controls with existing compliance standards instead of reinventing processes.

This approach accelerates security maturity, increases overall resilience, and enables teams to deliver stronger protection with higher efficiency and measurable effectiveness.

Surinder Lall

Head of Cyber Governance, Risk and Compliance
dmg media

Jan Olsson

Kriminalkommisarie / Police Superintendent
Swedish National Police SC3

Mikael Varverud

CISO
Iptor

Kasun Bandar

CISO
CCFP

Georgios Kryparos

CISO
Einride

11:55

Leveraging unified compliance frameworks such as NIS2, DORA, and the upcoming CRA allows organizations to establish standardized security baselines, streamline processes, and integrate regulatory requirements directly into operational workflows.

By treating compliance as a strategic guideline rather than a checkbox exercise, organizations can optimize resource allocation, reduce operational friction, and improve collaboration across teams, turning regulatory obligations into actionable business advantages.

This approach transforms compliance into a market differentiator, driving consistent security practices, enhancing organizational resilience, and positioning companies to gain a competitive edge in a rapidly evolving cybersecurity landscape.

Chris Brown

VP EMEA
Synack

12:20

Firestarter

12:25

Lunch Break

Time to gather after two main focus areas of the event (One For All and Public & Private Collaboration in Nordics), and gather our thoughts on it over the lovely seated lunch.


Chapter Three:

Security Without Borders:

Overcoming Barriers to Information Sharing

13:25

Explore proven frameworks, tools, and organizational strategies that enable secure, efficient, and compliant cross-border information sharing between organizations and security teams.

Attendees will learn how to break down silos, build trust, and improve collaboration, ensuring that critical threat intelligence is shared safely and acted upon quickly.

Implementing these best practices strengthens overall cyber resilience, reduces the risk of delayed response to threats, and fosters a culture of proactive, trusted information exchange across borders.

Tobias Wieloch

Head of Dark Web Team
Europol EC3

13:50

A panel of experts will explore how organizations navigate cultural differences and regulatory constraints to share cybersecurity information effectively across borders.

Attendees will gain actionable insights on building trust, fostering collaboration, and aligning processes across international teams and regulatory environments.

Implementing these best practices strengthens global cyber resilience, accelerates threat response, and promotes a culture of cooperative, cross-border security.

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

14:25

Explore a unified cybersecurity platform that enables secure collaboration and threat intelligence sharing across global teams, supported by real-world use cases and best practices.

Attendees will learn how to streamline cross-border security operations, reduce complexity, and enhance cooperation between diverse teams and regulatory environments.

Implementing these strategies drives faster threat response, stronger organizational resilience, and measurable improvements in global cybersecurity posture, turning integrated platforms into a competitive advantage.

Daniel Qvint

Enterprise Sales Engineer
Abnormal AI

14:50

Coffee Break

Let’s discuss what we hear about Security Without Borders over a cup of coffee and explore some new opportunities with the partners of the event.


Chapter Four:

The Future of AI and Cloud Security:

From Guidelines to Implementation

15:20

Explore strategies and frameworks to translate cloud security policies and guidelines into operational practices, covering compliance, automation, and real-world implementation.

Attendees will gain insights on how to streamline cloud security operations, align teams with standards, and reduce risk, ensuring that regulatory requirements are applied efficiently in practice.

Implementing these approaches strengthens organizational resilience, accelerates adoption of secure cloud practices, and prepares businesses for future regulatory and technological challenges.

Kjell Arne Yttervik

Nordics and CEE Security Channel
at Google

15:45

This session dives into the practical application of Zero Trust principles across modern cloud and AI environments, showing how to secure AI models, data pipelines, and interconnected services without slowing down innovation.

Participants will walk away with concrete strategies and real-world examples for implementing Zero Trust, balancing robust security with operational efficiency, and turning complex multi-cloud and AI challenges into manageable, repeatable practices.

By adopting these approaches, organizations can confidently scale AI initiatives, protect critical data, and build resilient cloud environments, ensuring that security becomes a business enabler rather than a bottleneck.

Deividas Lis

Cyber Threat Intelligence Officer
ECB (European Central Bank)

16:10

Examine the emerging field of Agentic AI, focusing on frameworks, tools, and methodologies for securing AI systems across organizational boundaries.

Attendees will learn how to manage AI risks, enforce governance, and implement security controls, ensuring AI adoption is safe, reliable, and compliant across the enterprise.

Applying these best practices builds trustworthy AI ecosystems, mitigates operational and ethical risks, and positions organizations to leverage AI securely for competitive advantage.

Flavio Aggio

CISO
WHO (World Health Organisation)

16:35

The Chairman will kick off the round table discussions with a brief introduction, highlighting why this moment in time is particularly important to address these two topics. He will provide context on the current challenges and opportunities in cloud security and AI regulations, explaining why participants’ insights and active engagement will be valuable for understanding best practices and future-ready strategies.

Flavio Aggio

CISO
WHO (World Health Organisation)

16:45

Each topic will be discussed at a dedicated round table for 30 minutes, with round table captains ensuring that everyone has an equal opportunity to participate. The discussions follow a “learning by teaching” approach, meaning that each participant shares their insights while actively listening to the perspectives of seven other guests.

After the first 30 minutes, all participants except the round table captain will change seats, allowing attendees to engage with new peers and gain diverse perspectives, ensuring a high-quality networking and knowledge-sharing experience.

Niclas Kjellin

Board Member
CSA Swedish Chapter

Round table moderators:

Jonaz Kumlander

Chief Technology Officer
Avidly

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

Kasun Bandar

CISO
CCFP

Girish Venkatappa

Security Architect
Volvo Financial Services

Siegfried Moyo

Author & Director, IT Security (Deputy CISO)
Americold Logistics, LLC

17:25

  • The increasing complexity and interconnectedness of supply chains have introduced new risks. This discussion will examine the vulnerabilities that come with third-party vendors and interconnected systems, and how organizations can implement effective supply chain security strategies.
  • Employee behavior remains one of the top causes of cyber breaches. This point will focus on the importance of educating and training employees to recognize and respond to security threats, and the potential risks of neglecting security awareness programs.
  • The discussion will center on how organizations can manage both supply chain security and internal security awareness. Experts will provide insights on how to integrate solutions that address both threats simultaneously for a more resilient and secure organization.

Gianclaudio Moresi

CISO
Forbo Group

Team Blue

Surinder Lall

Board Member
at UK Government for Cyber Security

Team Red

17:45

Book signing by

Surinder Lall

author of "Leading in the Age of AI"

18:00

Networking Dinner Cruise

The Grand Hôtel in Stockholm has been home to celebrities, high-profile events and everyday bon-vivants since 1874. Situated in the best waterfront location imaginable, the hotel overlooks the Royal Palace and Gamla Stan, Stockholm’s old town. The Grand is also home to the classic Swedish Veranda restaurant, renowned for its traditional smörgåsbord, Mathias Dahlgren’s awarded restaurants and the spectacular Cadier Bar. 

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event