Stockholm

March 13, 2025

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Strategic Alliances and Partnerships in Cybersecurity

Understanding ROI in Cybersecurity

Emerging Tech, Emerging Threats

Dark Web and Cybercrime   landscape

Empower Women in Cybersecurity

Strengthen Cloud Security in Modern Environments

Keynotes

MARIO BECCIA

Deputy CIO for Cybersecurity at NATO
Mario Beccia is NATO's Deputy CIO for Cybersecurity, responsible for leading major cybersecurity transformation programs. He holds a degree in Economics and Management, an MBA in innovation management, and multiple IT and cybersecurity certifications (PMP, CISM, CISSP, among others).

His career began in 1997 with a start-up focused on web technologies. He later became an independent IT consultant before joining NATO in 2006. At NATO Allied Command Transformation, he contributed to key initiatives like the NATO Computer Incident Response Capability (NCIRC) and IT Modernization programs, as well as leading cybersecurity tracks in prominent NATO exercises and think tanks.

In 2015, he transitioned to the NATO Communications and Information Agency, furthering NATO's cybersecurity infrastructure and fostering industry collaboration. He also served as Chief Information Security Officer at the European Defence Agency (2018–2021), spearheading cross-domain cybersecurity projects and organizing military CERT exercises.

Since 2021, Mario Beccia has been driving NATO's enterprise cybersecurity strategy, ensuring coherence and enhanced ICT services across the organization.

Viktor Polic

CISO ILO a UN agency
Viktor Polic is chief of Information Security and Assurance Services at International Labour Organisation (ILO) a UN agency, a specialized agency of the United Nations. He’s 25-year career in the IT industry spans multilateral financial, humanitarian, standardization and development public sector organizations (ITU, UNCC, UNHCR). Viktor conducts research in cryptography, data protection regulation, and risk management. Since the Internet bubble, he is teaching computer science and telecommunications courses as adjunct faculty at Webster University in Geneva. Viktor is a member of the Scientific Committee for Advanced Studies in Information Security at the University of Geneva. He advocates for advancement in information security as an author in journals and his personal blog (blog.cybersymbiosis.com), and as a speaker at numerous international security conferences. Viktor holds a Ph.D. in Cryptography and Advanced Protection Systems, MA in Computer Resources and Information Management, and BSc. in Computer Science. He is a member of (ISC)2, ISACA and IACR.

Steve Lupo

Special Agent - Cyber Task Force FBI
Steve Lupo is an experienced law enforcement professional with over 30 years of service. Currently serving as a Special Agent with the Federal Bureau of Investigation (FBI) in Houston, Texas, he specializes in crisis management and active shooter preparedness. Steve has been a member of the FBI SWAT team and previously held the role of Supervisory Special Agent in the Weapons of Mass Destruction Directorate in Washington, D.C. Before joining the FBI, Steve served as a Police Officer and Detective with the Irving Police Department in Texas and worked as an Undercover Investigator for Pinkerton Comprehensive Risk Management. He holds a Master's degree in Criminal Justice from Northeastern University and a Bachelor's degree in Political Science from the University of Massachusetts Amherst. Steve is certified as an FBI Firearms and Tactical Instructor, as well as an ALERRT Active Shooter Instructor/Coordinator. He is also actively involved in educating communities and organizations on safety and crisis response.

Partners

Ticket Price

990 €

Have a promo code?
Get your FREE ticket !!!

Apply for The C-Suite Edition

13th of March 2025


Welcome to the Next IT Security – March Edition, the premier event where cybersecurity leaders and innovators converge to address the most pressing issues in the field. Our agenda is packed with insightful discussions and strategies to tackle the latest challenges and opportunities in cybersecurity.

Strategic Alliances and Partnerships in Cybersecurity: Strengthening Defenses Through Collaboration
Explore how forming strategic alliances and partnerships, such as threat intelligence sharing platforms and managed security services, can significantly enhance your organization’s defense capabilities. Learn how collaboration is crucial for effectively combating sophisticated cyber threats.

Understanding ROI in Cybersecurity: Preventative Investment and Risk Mitigation
Discover the value of investing in cybersecurity through comprehensive training programs and advanced threat detection systems. Understand how preventative measures and risk mitigation contribute to a robust ROI by reducing the risk of costly breaches and ensuring long-term resilience.

Emerging Tech, Emerging Threats: How to Keep Up with Constant Updates and Improvements
Stay ahead of the curve with insights into adopting cutting-edge threat detection tools, automated response systems, and continuous learning platforms. This session will guide you on maintaining a strong cybersecurity posture amidst rapid technological advancements.

Dark Web and Cybercrime: Uncovering the Hidden Realities
Delve into the hidden world of the dark web and its impact on cybercrime. Learn how dark web monitoring services and advanced threat intelligence solutions can provide essential insights and protection against these elusive threats.

Empower Women in Cybersecurity: Bridging the Gender Gap
Address the gender gap in the cybersecurity industry by promoting diversity and empowering women to lead. Explore initiatives and strategies that foster an inclusive environment and leverage diverse perspectives for more effective cybersecurity solutions.

Strengthen Cloud Security in Modern Environments
Focus on safeguarding cloud infrastructures by addressing challenges such as data loss prevention, shared vulnerabilities, and maintaining visibility. Gain practical insights into innovative strategies and solutions for securing your cloud environment and ensuring data integrity.

Next IT Security aims to provide our attendees with cutting-edge insights and actionable strategies to stay ahead in the ever-evolving cybersecurity landscape.

Agenda

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

09:00

We will open the conference with this neglected topic – Dark Web. It remains a critical enabler of cybercrime, facilitating the trade of stolen data, malware, and illegal services. Therefore CISOs must understand the operational dynamics of the Dark Web, where sophisticated threat actors collaborate and exchange tactics. They even order ransomware attacks using Dark Web forums to distribute ransomware-as-a-service (RaaS). 

On the other side there are advanced tools and Threat Intelligence platforms that detect and monitor these hidden activities. 

Learn how to integrate these tools into your cybersecurity strategy. Learn how to develop a threat intelligence program that includes Dark Web surveillance, partnership with law enforcement, and real-time threat feeds to enhance your organization’s resilience against these hidden threats.

Steven Lupo

Special Agent - Cyber Task Force
FBI

09:25

Cyber threats are evolving rapidly, necessitating strategic alliances among Nordic organizations to bolster defenses. Many data breaches result in tons of compromised sensitive data sold on the Dark Web.

What can significantly improve detection and response capabilities is – Collaborative defense strategiy, such as sharing threat intelligence and pooling cybersecurity resources. Leveraging regulations like the NIS2 Directive ensures cross-border cooperation and compliance.

Learn how forming alliances with other organizations, cybersecurity vendors, and government entities can provide early warnings and coordinated responses to cyber incidents. You will also find out how to create or join cybersecurity alliances to share intelligence, resources, and best practices to improve collective defense capabilities and compliance with regulations.

Ola Pontén

CISO
SCA

Rudy Dordonne

CISO
Dustin