Stockholm

March 13, 2025

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Strategic Alliances and Partnerships in Cybersecurity

Understanding ROI in Cybersecurity

Emerging Tech, Emerging Threats

Dark Web and Cybercrime   landscape

Empower Women in Cybersecurity

Strengthen Cloud Security in Modern Environments

Partners

Ticket Price

990 €

Have a promo code?
Get your FREE ticket !!!

Apply for The C-Suite Edition

13th of March 2025


Welcome to the Next IT Security – C-Suites Edition, the most EXCLUSIVE cyber security event in the world, where we will bring together cybersecurity leaders and experts from the Nordic to share knowledge and insights on the latest trends and technologies in the field. 

In this edition of C-Suites we will delve with some interesting business critical topics.

  • Advanced New Technologies in the Service of Security Awareness: Explore how emerging technologies are reshaping Security Awareness programs, empowering organisations with novel tools and strategies.
  • Quantum Computing Takes Center Stage: Witness the practical accessibility of quantum computing with the latest market innovations, unravelling a new era of computational possibilities.
  • Unveiling the Vulnerable World of IoT: Embark on a journey to the edge of cybersecurity, where IoT vulnerabilities pose unprecedented challenges, and innovative solutions are paramount.
  • NIS2, DORA & GDPR Continuing Impact: Navigate the evolving landscape shaped by NIS2, DORA, and GDPR regulations, influencing cybersecurity strategies and compliance measures. 
  • Cloud Challenges – Data Loss, Shared Vulnerabilities, and More: Explore the complexities surrounding data loss and recovery, shared vulnerabilities in cloud environments, and the ongoing struggle for control and visibility in the cloud landscape.

Next IT Security aims to equip our readers with insights into the forefront of cybersecurity, where adaptation and innovation are indispensable in safeguarding the digital frontier. 

Our goal is to create a collaborative environment where cybersecurity C-Suites can exchange ideas and best practices.

Agenda

08:00

Registration

08:15

POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

09:00

  • Understanding Dark Web Dynamics: Analyze how the Dark Web operates as a platform for cybercriminals, including the types of activities and threat actors it fosters.
  • Responding to Rising Incidents: Examine recent high-profile cyber incidents linked to the Dark Web in the Nordic region and discuss strategies for mitigating such threats.
  • Legal and Ethical Considerations: Explore the complex legal and ethical issues related to Dark Web cybercrime, and the role of international collaboration in addressing these challenges.

09:25

  • Increased Digitization and Rising Cyber Threats: Explore how the growing digitization in the Nordics is leading to more sophisticated cyber threats and the need for stronger defense mechanisms.
  • Collaborative Defense Strategies: Discuss the benefits of pooling resources and expertise through strategic alliances to effectively counter evolving cyber adversaries.
  • Navigating Regulatory Challenges: Examine how partnerships help organizations comply with Nordic data protection and cybersecurity regulations while optimizing their cybersecurity investments.

Kranti Kumar Dasari

Director - Security Operations & Incident Response
Nasdaq

Jakob Stenstave

CISO
The HCI Group

10:00

  • Strategic ROI: Present cybersecurity as a vital investment, focusing on risk reduction rather than just costs.
  • Preventative Approach: Highlight how awareness programs function like insurance, delivering long-term security benefits.
  • Addressing Threats: Emphasize the critical need for robust solutions in light of increasing cyber threats in the Nordics.

10:20

Coffee break and 1-1 meetings

10:50

  • NIS2 Compliance: Emphasize how strategic alliances aid in meeting the stringent requirements of the NIS2 directive, ensuring robust cybersecurity across the Nordic region.
  • Enhanced Threat Detection: Discuss the role of partnerships in pooling resources and expertise to improve threat detection and response capabilities.
  • Regulatory Navigation: Explore how collaborations help organizations effectively navigate the complex regulatory landscape, optimizing cybersecurity investments.

11:15

  • Preventative Investment: Understand how cybersecurity awareness programs function as preventative measures, akin to insurance, enhancing security and reducing risks rather than providing direct monetary returns.
  • Current Cyber Threat Landscape: Explore the importance of investing in cybersecurity awareness in light of rising cyber attacks in Sweden and the Nordics, and how this investment is critical for bolstering defenses.
  • Reducing Risk and Ensuring Compliance: Discuss the impact of training employees to recognize and avoid cyber threats, including the reduction in incident remediation costs and ensuring compliance with regulatory requirements.

Henrik Thomsson

Head of IT Security at Lidl Sverige

11:50

  • Harnessing AI and ML: Explore the role of artificial intelligence and machine learning in keeping pace with rapid technological advancements and defending against emerging cyber threats.
  • Staying Ahead of Cybercriminals: Focus on leveraging AI-driven tools to anticipate and neutralize the evolving tactics of sophisticated cybercriminals.
  • Continuous Evolution: Highlight the importance of ongoing adaptation and learning in cybersecurity, ensuring resilience in an era of rapid technological change.

12:10

Lunch Break

13:15

  • Navigating Technological Advancements: Explore strategies for integrating new technologies into your cybersecurity framework, ensuring that updates and improvements are managed effectively to avoid vulnerabilities.
  • Combating Evolving Threats: Best practices for deploying advanced threat detection tools, including AI and machine learning, to stay ahead of cybercriminals who exploit emerging technologies.
  • Fostering Continuous Learning: Implement ongoing training and strategic alliances to keep your team updated on the latest advancements and threats, maintaining a resilient cybersecurity posture.

13:40

  • Securing Data in the Cloud: Discover advanced techniques and tools for preventing data loss and ensuring data integrity in cloud environments, focusing on the latest solutions designed to protect sensitive information.
  • Addressing Shared Infrastructure Vulnerabilities: Learn how to mitigate risks associated with shared cloud infrastructure, using cutting-edge technology to enhance isolation and reduce the potential for cross-tenant attacks.
  • Enhancing Visibility and Control: Explore innovative approaches to maintaining comprehensive visibility and control over cloud security, leveraging advanced monitoring and analytics to proactively manage and respond to threats.

14:05

  • Technological Advancements and Challenges: Address the opportunities and risks presented by rapid technological growth, and the importance of staying updated to avoid security vulnerabilities and missed innovation opportunities.
  • Advanced Cybercriminal Tactics: Examine how cybercriminals exploit new technologies and the necessity for organizations to implement cutting-edge threat detection and response tools to counter these evolving threats.
  • Continuous Learning and Adaptation: Emphasize the need for regular updates, ongoing training, and strategic alliances to remain resilient against sophisticated cyber attacks and maintain a competitive edge.

14:40

  • Strengthening Defense Against Evolving Threats: Explore how strategic alliances and partnerships enhance cybersecurity by pooling resources and expertise, enabling organizations to better detect and respond to sophisticated cyber threats.
  • Navigating Compliance and Regulatory Landscapes: Learn how collaborative efforts assist in navigating complex regulatory requirements, ensuring compliance with data protection standards while optimizing cybersecurity investments.
  • Proactive Infrastructure Investments: Discover recent advancements in cybersecurity infrastructure, including new data centers and national cybersecurity frameworks, and how partnerships play a key role in bolstering digital defenses in the Nordic region.

15:00

Coffee Break & 1-1 meetings

15:30

  • Viewing Cybersecurity as a Strategic Investment: Delve into how cybersecurity awareness programs serve as a proactive investment rather than a cost, similar to insurance, by mitigating risks and preventing financial losses from cyber incidents.
  • Impact of the Current Threat Landscape: Examine the increasing frequency of cyber attacks in Sweden and the Nordics, and discuss how investing in comprehensive cybersecurity awareness is essential to bolster defenses and address growing threats.
  • Enhancing Employee Resilience and Compliance: Understand how training employees to recognize and handle cyber threats effectively reduces remediation costs and ensures compliance, highlighting the critical need for investment in cybersecurity awareness programs.

15:55

  • Promoting Diversity in Leadership: Explore strategies to encourage and support women in taking on leadership roles within the cybersecurity field.
  • Overcoming Industry Barriers: Discuss challenges women face in cybersecurity and practical solutions for overcoming these obstacles to create an inclusive work environment.
  • Showcasing Success Stories: Highlight the achievements of female professionals in cybersecurity to inspire and motivate the next generation of women in the industry.

16:30

  • Securing Data Integrity: Delve into innovative techniques for safeguarding data from loss and unauthorized access in cloud environments.
  • Mitigating Shared Infrastructure Risks: Address strategies for handling vulnerabilities in multi-tenant cloud setups and ensuring robust protection.
  • Enhancing Cloud Visibility: Explore advanced tools and practices to maintain comprehensive oversight and control over cloud security dynamics.