Stockholm

March 13, 2025

Fully Booked

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Strategic Alliances and Partnerships in Cybersecurity

Understanding ROI in Cybersecurity

Emerging Tech, Emerging Threats

Dark Web and Cybercrime   landscape

Empower Women in Cybersecurity

Strengthen Cloud Security in Modern Environments

Keynotes

MARIO BECCIA

Deputy CIO for Cybersecurity at NATO
Mario Beccia is NATO's Deputy CIO for Cybersecurity, responsible for leading major cybersecurity transformation programs. He holds a degree in Economics and Management, an MBA in innovation management, and multiple IT and cybersecurity certifications (PMP, CISM, CISSP, among others).

His career began in 1997 with a start-up focused on web technologies. He later became an independent IT consultant before joining NATO in 2006. At NATO Allied Command Transformation, he contributed to key initiatives like the NATO Computer Incident Response Capability (NCIRC) and IT Modernization programs, as well as leading cybersecurity tracks in prominent NATO exercises and think tanks.

In 2015, he transitioned to the NATO Communications and Information Agency, furthering NATO's cybersecurity infrastructure and fostering industry collaboration. He also served as Chief Information Security Officer at the European Defence Agency (2018–2021), spearheading cross-domain cybersecurity projects and organizing military CERT exercises.

Since 2021, Mario Beccia has been driving NATO's enterprise cybersecurity strategy, ensuring coherence and enhanced ICT services across the organization.

Viktor Polic

CISO ILO a UN agency
Viktor Polic is chief of Information Security and Assurance Services at International Labour Organisation (ILO) a UN agency, a specialized agency of the United Nations.

He’s 25-year career in the IT industry spans multilateral financial, humanitarian, standardization and development public sector organizations (ITU, UNCC, UNHCR).
Viktor conducts research in cryptography, data protection regulation, and risk management. Since the Internet bubble, he is teaching computer science and telecommunications courses as adjunct faculty at Webster University in Geneva.

Viktor is a member of the Scientific Committee for Advanced Studies in Information Security at the University of Geneva. He advocates for advancement in information security as an author in journals and his personal blog (blog.cybersymbiosis.com), and as a speaker at numerous international security conferences.

Viktor holds a Ph.D. in Cryptography and Advanced Protection Systems, MA in Computer Resources and Information Management, and BSc. in Computer Science. He is a member of (ISC)2, ISACA and IACR.

Jason Lowder

Cyber Assistant Legal Attaché Federal Bureau of Investigation Sweden
Jason Lowder is an experienced law enforcement professional with over 20 years of service. He is currently serving as an Assistant Legal Attaché with the Federal Bureau of Investigation in Stockholm, Sweden.

Since starting with the FBI in 2004, Jason has conducted financial fraud and national security cyber threat investigations while stationed at the Houston Field Office and at FBI Cyber Division Headquarters in Washington, D.C. In 2021, Jason started his current assignment as the Cyber Assistant Legal Attaché. In this position, he engages with various partners in Sweden, Norway, Finland, Denmark and Iceland regarding cyber threats/cyber investigations.

He holds a bachelor's degree in accounting from the University of Illinois - Springfield and is a Certified Public Accountant.

Moona Ederveen

Principal Consultant at ISF
Moona Ederveen, is a Board Advisor and Innovative Tech Influencer, and most recently, served as Executive Director EMEA in financial services.

Visiting international security conferences from age 16, she consulted at global banks and advised on cyber security and risk for nearly two decades. As a multi-lingual brand ambassador to financial services, other sectors, and government stakeholders, she is an avid builder of trusted communities.

A strong advocate for cross-sector crisis preparedness and resilience, she also works to encourage the next generation of talent into tech careers.

Henrik Thomsson

Head of IT Security
Lidl Sverige KB

Henrik Thomsson is an accomplished leader in digital transformation and technology innovation, with extensive experience in the financial services and insurance sectors. He has led strategic initiatives focused on harnessing data, AI, and digital technologies to drive business growth and operational efficiency. With a proven track record of driving change, Henrik has played a pivotal role in streamlining complex systems and delivering customer-centric solutions. His leadership emphasizes collaboration, innovation, and agility, positioning him as a forward-thinking professional in the digital landscape.

Johan Templeman

CISO
Teamtailor

IT Leader with 15 years of experience in developing and managing SaaS applications, specializing in logistics, transportation, and IT security. Skilled at operating and enhancing critical cloud applications, with strengths in bridging the gap between sales, product, and technology teams. Known for strong analytical abilities, creativity, and teamwork. A fast learner with a curious and inventive mindset, colleagues often describe me as knowledgeable, helpful, and solution-focused.

Jörgen Ottoson

CISO, DPO
BITS DATA i Södertälje AB

Broadly interested in communication security, info/IT-security, intelligence, geopolitics, surveillance and privacy issues and have been involved in various projects pertaining to such areas, also noncommercial ones, including the PGP community in the early days of the "crypto wars" in the late 90'.

 

Earlier worked as a security expert in the swedish banking community, involved with PIN security, key management and ATMs. Do a fair amount of admin and maintenance on Linux-systems and firewalls/IDSes as well.

 

Lately also undertook some academic studies in IT forensics, data communications and some aspects of cryptography.

Mikael Varverud

CISO
Iptor

Mikael Varverud is an experienced IT and cybersecurity professional with a strong background in secure software development, digital forensics, and penetration testing. He has expertise in building robust cybersecurity strategies and implementing security controls to mitigate risks. With a career spanning various leadership roles, Mikael is skilled at aligning technical security solutions with business objectives, ensuring optimal protection and resilience for organizations. His focus is on integrating advanced security practices to support both compliance and innovation in complex IT environments.

Elena Marzi Tornblad

Cybersecurity Strategy & Research Officer
RISE

A cybersecurity professional with a strong sense of responsibility, commitment, and integrity.

 

My strongest skill is my breadth of experience. I have worked as an engineer in the automotive industry, as a lawyer specializing in intellectual property and competition law, and as a teacher in Engineering and Real-time systems. This diverse background gives me a unique, invaluable perspective and a deep understanding of how technical elements relate to regulations and customer needs. It also equips me with strong leadership skills, enabling me to approach complex problems with structure and creativity.

 

I am passionate about cybersecurity, which has been my profession and interest for years. My strongest technical skill lies in product cybersecurity and embedded systems. In my current role, I work as a strategist in IT cybersecurity for one of the biggest players in the automotive industry.

 

My core values are compassion, collaboration, and perseverance.

Sebastian Rosendahl

CISO
Consilium Safety Group

The speaker's biography is being prepared.

Please check back soon for more details.

Rudy Dordonne

CISO
Dustin

I am a Business Leader with a passion for Information Security.

 

My goal is to support the business in reaching its objectives by providing trust in Information Security. While having a deep understanding of the technologies supporting Information Security, I am convinced that it is first a business and people concern.

 

My business knowledge and experience allow me to turn complex problems into digestible, actionable information, making me able to interface with the chain of command from strategical to operational level. I thrive in international and multicultural environments and I embrace the associated challenges. I am particularly interested in improvement opportunities as demonstrated in all the positions I have held.

 

Committed to continuous learning, I enjoy learning from my peers and growing along with my team

Tom Kjølhamar

Head of IT Security
Moelven

The speaker's biography is being prepared.

Please check back soon for more details.

Nithin Krishna

Head of Cyber Security
Jeppesen, a Boeing Company

For over 19 years, I have served as a Cybersecurity Architect, Leveraging industry-recognized certifications like CISSP, OSCP, and AWS-Sec, I possess in-depth expertise across various cybersecurity and cloud domains.

 

My core competencies encompass:

 

- Delivering innovative solutions in penetration testing, vulnerability assessment, DevSecOps, and AI automation.

- Demonstrating proven experience with OWASP Top 10 and SANS 25 vulnerabilities.

- Developing vulnerability scanning tools using Python and Anaconda.

- Maintaining proficiency in RPA (BluePrism, UiPath, Automation Anywhere) and the Selenium framework (TestNG, BDD).

- Building an extensive work history with diverse clients across banking, insurance, retail, and the cybersecurity sector.

- Contributing to a proven track record of establishing security and automation best practices and standards.

 

I am passionate about empowering organizations to safeguard their data and assets from ever-evolving cyber threats, ultimately optimizing their overall security posture and performance.

Jakob Stenstave

CISO
TechMahindra

With a background as Naval officer for the last decade working as a Security Officer/Security Protection Officer/Data Protection Officer and Expert/Sr Project, Programme & Portfolio Manager with a Special interest in Security.- I’m always taking holistic view (Including Information, personal and physical Security), and weighing business value together with Security Risks.

Areas of expertise

Security Management

Education/Training -

Portfolio, Programme, Project & Benefits management.

 

I hold PMP®, Managing Benefits™, MoP®, MsP® and Prince2® Practitioner certificates.

I’ve previously been an accredited trainer for Managing Benefits™ & PRINCE2

Sanjay Kumar

Threat Intelligence Manager (CTI)
Landis+Gyr

Sanjay Kumar is cybersecurity researcher and professional, currently working as Threat Intelligence Manager in Landis+Gyr Finland. He has over a decade of experience in the field of Cyber Security. His expertise includes threat intelligence, advanced threat detection, threat hunting, L3 investigations and building threat detection rules. Beside this work, he is also doing PhD in Cyber Security, where he has developed several ML/AI based threat detection systems, and authored eight publications with more than 140 citations. Sanjay has won several awards in recognition of his technical, academic and research contributions. Also, he has conducted several workshops, seminars and events in the field of Cybersecurity and participated as speaker in many international conferences. He is also serving as IEEE Young Professionals Chair in Finland since 2022.

Elpidoforos Arapantonis

Senior Information Security Officer
Vattenfall

Elpidoforos Arapantonis is a Senior Security Officer in the energy sector with extensive experience in Information and Cyber Security. Over the past decade, he has held key security roles in the automotive and energy sectors, he has worked with OEMs and suppliers to strengthen security strategies, implement risk mitigation measures, and align cybersecurity practices with industry standards. 

Magnus Carling

CISO
Stena AB

I'm a versatile manager with experience in the IT business since 1995. My experience range from network engineering and server management, to IT-management frameworks and information security management. IT and security has been part of my life for a long time and I enjoy the potential IT unlock in both humans as well as enterprises - as long as it is secure.

 

Most of my spare time I spend with my family and friends. I like to try new recipes, barbecue, explore new and old wines, go snowboarding whenever I can, run and write.

 

Writing is a big part of my life and I write stories that are everything but ordinary.

Linda Avad

CISO
OKQ8

With over two decades in information security, my role as Chief Information Security Officer at OKQ8 is complemented by my expertise in cyber defense at Försvarsmakten. My competencies extend to agile methodologies and software project management, ensuring strategic oversight and robust security infrastructure. At OKQ8, our mission to protect corporate assets aligns with my goal to innovate and strengthen cybersecurity measures. My certification as a CISA underscores my commitment to excellence in this dynamic field.

Magnus Clarving

CISO
ATG

Experienced Senior Manager Information Security with a demonstrated history of working in the information technology and services industry. Strong professional skilled in IT Governance, IT Management, IT Strategy, Information Security, and Project Management.

Michael Adjei

Director Systems Engineering
Illumio

Michael Adjei has over 20 years’ experience in network and cybersecurity across various roles. He is Director of Systems Engineering where he is responsible for overseeing the Northern Europe systems engineering teams and delivering technical product oversight.  Michael is an accomplished public speaker, regularly speaking at conferences and webinars. He holds a MSc in Network Systems Engineering and a BSc in physics in addition to several industry certifications.

Dennie Karlsson

Group CISO and Head of Risk Management
Dustin

As the Group CISO at Dustin, I oversee the enterprise-wide vision, strategy, and security program to protect our information assets and technologies. With over 8 years of experience in cybersecurity and information security, I have a strong background in governance, risk management, technical security, and strategic planning.

 

My mission is to enable and support Dustin's transformation without increasing our risk appetite. I believe in security that optimizes the balance between protection level and business objectives. As a leader, I am result-oriented, trust-based, and coaching-oriented. I value self-autonomy, decisiveness, and collaboration in my team of 12 security professionals.

Dan Anconina

CISO
XM Cyber

Dan Anconina is the Chief Information Security Officer (CISO) at XM Cyber, where he leads the cybersecurity department with a focus on innovation and maintaining a low-risk tolerance in the ever-evolving cybersecurity landscape. 

With a strong technical background and hands-on experience, Dan plays a pivotal role in advancing XM Cyber's security posture. In addition to driving technical initiatives, Dan oversees governance, risk assessments, and compliance (GRC) efforts to ensure holistic risk management. 

With over 11 years of experience, Dan has built and managed GRC, Infosec, and SOC teams from the ground up and has been deeply involved with creating and establishing cross-company procedures. 

Prior to XM Cyber, Dan held several roles at CheckPoint technical support center, leading VIP customers and managing security teams. 

Dan holds a BSc in electrical engineering and communication and brings valuable experience in M&As, securing development lifecycles, and risk assessment.

David Karlsson

Head of Security
Storytel

The speaker's biography is being prepared.

Please check back soon for more details.

Alexander Pick

Security Researcher

Alexander Pick is a seasoned security expert with 25 years of experience spanning defense, aerospace, automotive, and beyond. Throughout his career, he has taken on various roles and responsibilities, moving into management and back while staying deeply connected to hands-on technical work.

 

Alexander is specializes in reverse engineering and low-level systems, diving into the intricate details of both hardware and software. As a 100% freelance researcher, he dedicates his time to uncovering vulnerabilities, making a name for himself as a Top 100 Bug Bounty researcher.

 

Despite decades in the industry, Alexander remains a true tech nerd at heart—constantly exploring, tinkering, and pushing the boundaries of security. Whether analyzing embedded systems, breaking down complex architectures, or hunting for critical exploits, his work is driven by curiosity and a relentless pursuit of knowledge.

Fanny Storm

Enterprise Account Executive
WIZ

The speaker's biography is being prepared.

Please check back soon for more details.

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

Richard Meeus is Akamai’s EMEA Director of Security Technology and Strategy. With more than 20 years of experience, Richard is responsible for designing and building secure solutions for some of the world’s most influential organisations.

Richard is an industry expert in cloud computing, enterprise software, and network security. During his time at Akamai, Mirapoint, and Prolexic, Richard has had held strategic roles across a broad range of projects, including the deployment of DDoS solutions for multinational organizations to protect critical infrastructure and sensitive data. Additionally, Richard is a chartered member of the BCS and a CISSP.

Vinay Dabas

Senior Solution Architect
Ping Identity

The speaker's biography is being prepared.

Please check back soon for more details.

Wade Lance

Global Field CISO
Synack

Wade has been productizing new technologies in cyber security, education and healthcare for over 20 years. He has diverse experience in security solution design for global 1000 organizations, and a passion for mentoring and developing cyber security leaders.

Ola Ponten

CISO
SCA

With over 10 years of experience in information security, I have developed a strong expertise in cyber risk management, cyber security risk mitigation. I have also a background as a police officer and a computer scientist, which gives me a unique insight into computer crime, IT-forensics, and law enforcement investigation and interviewing. I have worked in international environments within UN and EU organizations, where I was responsible for extracting and analyzing digital evidence. Together with my teams, I have built resilient cyber security environments, handled complex incidents, and identified and mitigated cyber security risks. I am passionate about protecting data, systems, and people from cyber threats, and I strive to create a culture of security awareness and best practices.

Scott Melnyk

CISO
Internationella Engelska Skolan

With a rich professional background in data protection and privacy, Scott Melnyk is an ideal candidate to speak on the topic of GDPR. His comprehensive experience in leading global privacy compliance programs and designing effective data governance strategies highlights his profound expertise in this field. Scott's role as the Chief Privacy Officer at Klarna, coupled with his prior engagements at renowned companies, showcases his commitment to ensuring regulatory compliance and safeguarding sensitive data. His strong grasp of the legal and technical aspects of GDPR, along with his ability to bridge these dimensions, makes him a valuable contributor to discussions surrounding GDPR's challenges and implications. As an accomplished privacy professional, Scott's insights will undoubtedly enrich the discourse on the complex landscape of data protection in today's digital age.

Rolf Lindby

CISO
Bulls Press

The speaker's biography is being prepared.

Please check back soon for more details.

Johan Åtting

CISO
Sectra AB

Manager/Coach/Speaker/BoardMember. My goal is to help organisations, departments, teams & individuals excel. I believe in challenging status quo and value simplicity & flexibility. I do this by adapting to the context and having a pragmatic approach to make things as effective as possible.

 

I have 30 years professional experience from various industries such as MedTech, Bank & Finance, Telecoms and Transport. Over the years I have had various management related roles; e.g. project manager, service manager, change manager, bid manager, department manager, operations manager, quality manager, information security officer; always with a focus on operational excellence - growing people and business.

Martin Karlsson

CISO
AP3 (Tredje AP fonden)

Martin is a seasoned cybersecurity professional with a diverse background in the field, boasting a successful career trajectory that has spanned various critical roles in information security.

Currently serving as the Chief Information Security Officer (CISO) at “Svensk e-identitet” (a company within the Visma group).

With a strong foundation as an Information Security Specialist, Martin honed his skills in risk assessment, vulnerability management, and security policy development.

He also has a background as a physical and digital penetration tester, uncovering vulnerabilities regarding social engineering, access control systems, IT-systems and applications.

He sees himself as an IT-professional with a passion to learn from people, problems, news, articles, and technology.

Quote:  "I always aim to increase efficiency and simultaneously raise the level of security. I try to have a holistic view of things and problems

Partners

Hospitality Powered by:

Stay in the Heart of Stockholm!

Book now and get 15% off with the promo code TECHBOOK25

Don’t miss this exclusive offer – your perfect Stockholm getaway awaits!  

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Fully Booked
waiting list

Apply for The C-Suite Edition

13th of March 2025

Welcome to the Next IT Security – March Edition, the premier event where cybersecurity leaders and innovators converge to address the most pressing issues in the field. Our agenda is packed with insightful discussions and strategies to tackle the latest challenges and opportunities in cybersecurity.

Strategic Alliances and Partnerships in Cybersecurity: Strengthening Defenses Through Collaboration
Explore how forming strategic alliances and partnerships, such as threat intelligence sharing platforms and managed security services, can significantly enhance your organization’s defense capabilities. Learn how collaboration is crucial for effectively combating sophisticated cyber threats.

Understanding ROI in Cybersecurity: Preventative Investment and Risk Mitigation
Discover the value of investing in cybersecurity through comprehensive training programs and advanced threat detection systems. Understand how preventative measures and risk mitigation contribute to a robust ROI by reducing the risk of costly breaches and ensuring long-term resilience.

Emerging Tech, Emerging Threats: How to Keep Up with Constant Updates and Improvements
Stay ahead of the curve with insights into adopting cutting-edge threat detection tools, automated response systems, and continuous learning platforms. This session will guide you on maintaining a strong cybersecurity posture amidst rapid technological advancements.

Dark Web and Cybercrime: Uncovering the Hidden Realities
Delve into the hidden world of the dark web and its impact on cybercrime. Learn how dark web monitoring services and advanced threat intelligence solutions can provide essential insights and protection against these elusive threats.

Empower Women in Cybersecurity: Bridging the Gender Gap
Address the gender gap in the cybersecurity industry by promoting diversity and empowering women to lead. Explore initiatives and strategies that foster an inclusive environment and leverage diverse perspectives for more effective cybersecurity solutions.

Strengthen Cloud Security in Modern Environments
Focus on safeguarding cloud infrastructures by addressing challenges such as data loss prevention, shared vulnerabilities, and maintaining visibility. Gain practical insights into innovative strategies and solutions for securing your cloud environment and ensuring data integrity.

Next IT Security aims to provide our attendees with cutting-edge insights and actionable strategies to stay ahead in the ever-evolving cybersecurity landscape.

Agenda

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

08:55

Firestarter by DigiCert

09:00

We will open the conference with this neglected topic – Dark Web. It remains a critical enabler of cybercrime, facilitating the trade of stolen data, malware, and illegal services. Therefore CISOs must understand the operational dynamics of the Dark Web, where sophisticated threat actors collaborate and exchange tactics. They even order ransomware attacks using Dark Web forums to distribute ransomware-as-a-service (RaaS). 

On the other side there are advanced tools and Threat Intelligence platforms that detect and monitor these hidden activities. 

Learn how to integrate these tools into your cybersecurity strategy. Learn how to develop a threat intelligence program that includes Dark Web surveillance, partnership with law enforcement, and real-time threat feeds to enhance your organization’s resilience against these hidden threats.

Jason Lowder

Cyber Assistant Legal Attaché
Federal Bureau of Investigation Sweden

09:25

Cyber threats are evolving rapidly, necessitating strategic alliances among Nordic organizations to bolster defenses. Many data breaches result in tons of compromised sensitive data sold on the Dark Web.

What can significantly improve detection and response capabilities is – Collaborative defense strategy, such as sharing threat intelligence and pooling cybersecurity resources. Leveraging regulations like the NIS2 Directive ensures cross-border cooperation and compliance.

Learn how forming alliances with other organizations, cybersecurity vendors, and government entities can provide early warnings and coordinated responses to cyber incidents. You will also find out how to create or join cybersecurity alliances to share intelligence, resources, and best practices to improve collective defense capabilities and compliance with regulations.

Moderator: Michael Adjei

Director Systems Engineering
Illumio

Nithin ‎Krishna

Head of Cyber Security
Jeppesen, a Boeing Company

Dennie Karlsson

Group CISO and Head of Risk Management
Dustin

Tom Kjølhamar

Head of IT security
Moelven Industrier

Magnus Carling

CISO
Stena AB

10:00

In today’s rapidly evolving cyber threat landscape, traditional vulnerability management approaches often fall short in providing comprehensive protection.

This keynote will explore “The Future of Vulnerability Management: XM Cyber’s Digital Twin Innovation,” highlighting how XM Cyber’s groundbreaking Digital Twin technology redefines the way organizations identify, prioritize, and remediate exposures. Attendees will gain insights into the dynamic modeling of their digital environments, enabling proactive threat detection and streamlined security strategies.

Don’t miss the opportunity to learn how integrating Digital Twin capabilities can not only bolster your cybersecurity posture but also transform vulnerability management into a more effective security approach.

Dan Anconina

CISO
XM Cyber

10:20

Coffee break and 1-1 meetings

10:50

Firestarter YesWeHack

10:55

Join Bugcrowd’s customer David Karlsson, Head of Security at Storytel, as he explores unlocking the collective ingenuity of hackers to stay one step ahead of emerging cyber threats. He will be joined on stage by Alexander Pick, independent Security Researcher on the Bugcrowd platform. This fireside chat style case study will delve into the intricacies of technology in crowdsourced security, collaboration with ethical hackers, and the importance of a shift left mindset for product security.

David Karlsson

Head of Security
Storytel

Alexander Pick

Security Researcher

11:15

As organizations increasingly rely on cloud services they must tackle issues related to shared responsibility models, misconfigurations, insufficient identity and access management (IAM) and lack of visibility into cloud workloads. Supply chain attacks further illustrated the danger of lateral movement and privilege escalation in hybrid cloud environments, requiring a more sophisticated approach to cloud security.

You must attend this discussion and hear first hand experience on implementing robust cloud security practices, such as Zero Trust Architecture, micro-segmentation, continuous monitoring, and cloud-native security tools. Learn how to conduct a cloud security audit to identify vulnerabilities and potential misconfigurations. How to leverage cloud-native security services provided by cloud vendors to gain deep visibility and control.

Moderator: Fanny Storm

Enterprise Account Executive
WIZ

Johan Tempelman

CISO
Teamtailor

Magnus Clarving

CISO
ATG

Mario Beccia

Deputy CIO for Cybersecurity
NATO

Linda Avad

CISO
OKQ8

11:50

  • Understand how to practically reduce your attack surface while reducing costs and achieving payback within 6 months
  • See how microsegmentation accelerates incident response, simplifies ongoing operations, and compares to traditional firewall segmentation
  • Get clear insights into the time, effort, and investment required to successfully deliver and maintain microsegmentation in your organisation

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

12:10

Firestarter by KnowBe4

12:10

Lunch Break

13:10

Firestarter Zerto

13:15

In an era where cyber threats transcend borders, NATO’s approach to cybersecurity offers valuable insights into how strategic alliances can serve as powerful multipliers of defense capabilities. 

Join us for an exclusive session led by a NATO cybersecurity official, who will share their experiences and lessons learned from coordinating cybersecurity efforts among member states.

This session will delve into NATO’s approach, which emphasizes collaborative defense, real-time intelligence sharing, and joint incident response mechanisms to counter sophisticated cyber adversaries.

The discussion will cover:

  • NATO’s Cyber Defense practise
  • The Role of Collective Cyber Deterrence
  • Leveraging Shared Resources and Expertise

Why Attend: In this era of global cyber instability, understanding NATO’s approach to cybersecurity can provide a strategic advantage for organizations in the Nordics. By adopting similar collaborative models, CISOs and IT leaders can enhance their organization’s defense capabilities. This session is a unique opportunity to gain firsthand knowledge from one of the world’s leading cybersecurity coalitions and apply these insights to your own strategic initiatives.

Mario Beccia

Deputy CIO for Cybersecurity
NATO

13:40

In today’s digital world, identity fraud is a growing threat, with increasingly sophisticated tactics challenging traditional security measures. The “3D Approach to Identity Fraud” introduces a holistic framework—Detection, Decision, and Defense—designed to help organizations understand, manage, and mitigate these risks. This approach integrates cutting-edge detection methods, risk-based decision-making, and adaptive defenses to safeguard digital identities effectively.”

Vinay Dabas

Senior Solution Architect
Ping Identity

14:05

The conference concludes with a forward-looking keynote that explores the dual impact of rapid technological growth on cybersecurity and the need for continuous adaptation, learning, and strategic partnerships to maintain a resilient defense posture.

The rapid pace of technological evolution is transforming the cybersecurity landscape, presenting both unprecedented opportunities and challenges. The integration of 5G, quantum computing, AI, and IoT into business operations brings new vulnerabilities. For CISOs and IT leaders, staying ahead of technological evolution is critical to prevent sophisticated attacks and ensure resilience. Embracing these technological advancements with a proactive cybersecurity strategy can provide significant competitive advantages. Find out about strategic priorities to tackle future cyber threats collaboratively.

Attend this keynote to learn how to develop a long-term cybersecurity roadmap that incorporates emerging technologies and their potential risks. Hear this  final thoughts from our expert and get your takeaway to implement and advocate for stronger, more resilient cybersecurity practices in your organization.

Viktor Polic

CISO
ILO a UN agency

14:30

Most security testing today is purely tactical – we find vulnerabilities and sometimes fix them. But what if a comprehensive approach to security testing could enable organizations to aggressively innovate and take full advantage of business opportunities? Join us to discuss:

  • Focus on what matters most- Internet-facing, mission critical assets
  • Not all PTaaS is created equal- how to get the most from PTaaS
  • Risk-based vulnerability management that works
  • Maximizing testing value- pattern discovery, remediation and reporting

Wade Lance

Global Field CISO
Synack

14:55

Firestarter GitLab

15:00

Coffee Break & 1-1 meetings

15:30

Round Table Discussions

  • Emerging Tech, Emerging Threats: Staying Ahead in a Rapidly Evolving Landscape
  • ROI for Cybersecurity: Essential Investment or Costly Expense?

Round table moderators:

Jörgen Ottoson

CISO&DPO
BITS DATA i Södertälje AB

Sanjay Kumar

PhD, CTI
Landis+Gyr

Henrik Thomsson

Head of IT Security
Lidl Sverige

Ola Ponten

CISO
SCA

Sebastian Rosendahl

CISO
Consilium Safety Group

Elena Marzi Tornblad

Cybersecurity Strategy & Research Officer
RISE

Elpidoforos Arapantonis

Senior Security Officer
Vattenfall

Scott Melnyk

CISO
Internationella Engelska Skolan

Rolf Lindby

CISO
Bulls Press

Johan Åtting

CISO
Sectra AB

Jakob Stenstave

CISO
TechMahindra

Martin Karlsson

CISO
AP3 (Tredje AP fonden)

16:30

A short walk from Grand Hotel to Cruise.

17:00

Firestarter ThreatLocker

17:05

This session provides concrete actions for attracting and retaining diverse talent, based on the results of a new survey. Moona Ederveen-Schneider addresses how inclusive leadership and allyship can make all the difference in closing the talent gap and helping our societies not just be secure, but prosper as well. Covering DEI from the perspective of age, neurology, sexuality, ethnicity and nationality, gender, and non-traditional pathways into IT security, this closing keynote will leave you motivated and equipped to be a more inclusive leader or ally.

Moona Ederveen

Principal Consultant
ISF

17:30

Book signing by Magnus Carling, first 2 parts of Monster trilogy (sequel of the Svart Kod trilogy)

Magnus Carling

CISO
Stena AB

18:00

Networking Dinner Cruise

The Grand Hôtel in Stockholm has been home to celebrities, high-profile events and everyday bon-vivants since 1874. Situated in the best waterfront location imaginable, the hotel overlooks the Royal Palace and Gamla Stan, Stockholm’s old town. The Grand is also home to the classic Swedish Veranda restaurant, renowned for its traditional smörgåsbord, Mathias Dahlgren’s awarded restaurants and the spectacular Cadier Bar. 

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event