Stockholm

October 23, 2025

"It is not the strongest of the species that survive, nor the most intelligent,
but the one most responsive to change." - Charles Darwin

Media Partners

Click on the Fast Link buttons to learn more

Agenda

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Collaboration, Communication & Trust in Cybersecurity    Is It Time to Return to Traditional Methods Due to    Advancements in Technology?

Are you ready for Hacktivists and Nation States?
   They are targeting Nordics Critical Infrastructure

AI Security culture
   Your employees might be using AI in a way that harms    your company without even realizing it.

2026 & Beyond
   From Compliance to Emerging Threats in Cloud Universe

The Weakest Link in Your Organization:
   Supply Chain or Security Awareness?

Keynotes

Tobias Ander

Manager IT Security at Försvarsmakten (Swedish Armed Forces)
Tobias Ander got more than 20 years of experience in information security.

Today he is CISO at Örebro Kommun, runs his own company Securebyme and recently released the book Informationssäkerhetskultur (Information security culture) in swedish.

Tobias was awarded “This year’s GRC-profile” in 2017 for his commitment in Governance Risk and Compliance.

Flavio Aggio

CISO at WHO (World Health Organisation)*
As Chief Information Security Officer (CISO), Flavio Aggio is responsible for Information Security and Cybersecurity at the World Health Organization (WHO). Additionally, he represents WHO in key forums focused on Information Security and Cybersecurity. With more than 30 years of experience in specialized chemical manufacturing, semiconductor, consumer product, government, and international organization industries, Flavio brings tremendous technical leadership and operational expertise to WHO. Prior to joining WHO, Flavio was the Chief Technology Officer at the City and County of San Francisco, where he developed technology solutions to modernize and protect the city. Before that, he held technical leadership positions in Enterprise Architecture, Project Management, Telecommunications, and IT operations with Unisys, ASML, Dow Chemical, and Rohm & Haas.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory at INTERPOL
Vincent Danjean is the Head of the Cyberspace and New Technologies Laboratory at INTERPOL, where he leads strategic efforts to understand and address the impact of emerging technologies on criminal behavior and investigative practices. With over 22 years of service at INTERPOL, he has held multiple leadership roles, including overseeing information security incident response and participating in internal governance as a member of the Joint Appeals Committee. Vincent is actively engaged in numerous international working groups and advisory boards, including the European Commission’s Fighting Crime and Terrorism Interest Group and the Global Forum on Cyber Expertise. He also contributes to ethical and scientific committees, including the Egregor initiative and the WWF/TRAFFIC UNITE Project focused on combating environmental crime through innovative technologies.

Fireside Chats

Magnus Carling

CISO at Stena AB
I'm a versatile manager with experience in the IT business since 1995. My experience range from network engineering and server management, to IT-management frameworks and information security management. IT and security has been part of my life for a long time and I enjoy the potential IT unlock in both humans as well as enterprises - as long as it is secure. Most of my spare time I spend with my family and friends. I like to try new recipes, barbecue, explore new and old wines, go snowboarding whenever I can, run and write. Writing is a big part of my life and I write stories that are everything but ordinary.

Thomas B. Zuliani

Global CISO at Arla Foods
Thomas Zuliani is a seasoned cybersecurity expert and the Global Chief Information Security Officer (CISO) at ARLA Foods, with extensive experience in leading security strategies across multinational organizations such as Pandora, Vestas or Siemens. He has a proven track record in risk management, data protection, and securing global infrastructure. Passionate about driving innovation in cybersecurity, Thomas is committed to safeguarding the integrity of digital transformation and ensuring compliance with industry standards, which granted several awards and recognitions on the past years, such as: Top Global CISO in the World by Cyber Defense Magazine 2024
Best Global CISO Top100 by HotTopics 2023 & 2024
Top 3 Best CISO Denmark by ComputerWorld 2022
Board Memberships & Advisory Roles: Nordic CISO Governing Body (Evanta/Gartner), Executive Advisory Board (IDC, SailPoint and Orange Cyber Defense)

Surinder Lall

Board Member at UK Government Cyber Security
Surinder is a seasoned leader with over 25 years of experience in the technology sector, backed by a robust academic background including a postgraduate Masters in Law (LL.M) from Strathclyde University and a B.A. in International Business & Management from Bournemouth University, alongside numerous prestigious cyber security certifications including but not limited to CISSP, CEH, CHFI, C:CISO

A passionate innovator his work at Paramount resulted in him receiving the Top Innovator Award from the CEO of Paramount International in 2019. In 2022 he was also called to serve on the prestigious UK Government's Cyber Security Advisory Board, advising the Cabinet Office the highest office of UK government leadership on critical cyber security matters where he continues to serve today.

Gianclaudio Moresi

CISO at Forbo Group
As a distinguished Inventor, Author, and International Speaker at CISO events, I have over 25 years of experience in the Cybersecurity domain, serving as a consultant to multinational corporations, governments, and military forces. I am the esteemed author of pivotal cybersecurity books, "The Three Laws of Cybersecurity" and "Zero Trust Network & Zero Internet" and have pioneered several whitepapers and innovations in the field, including the development of the first system incorporating "Zero Trust Architecture / Zero Day Protection" (2014), an algorithm for detecting "Ransomware with Intermittent Encryption" (2021), a novel algorithm to detect the "MFA Bypass" for Browsers (2023) and "Theoretical Attacks to FIDO2/Yubikey" (2023). As a frequent contributor to CISO events, my insights have played a pivotal role in influencing discussions and shaping strategies related to cybersecurity, awareness, and risk management.

Book Authors

Magnus Carling

CISO at Stena AB

Gianclaudio Moresi

CISO at Forbo Group
Author of the books
"The Three Laws of Cybersecurity" &
"Zero Trust Network - Zero Internet"

Tobias Ander

Manager IT Security at Försvarsmakten (Swedish Armed Forces)

Partners

Stay in the Heart of Stockholm!

Book now and get 15% off with the promo code TECHBOOK25

Don’t miss this exclusive offer – your perfect Stockholm getaway awaits! 

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Apply for The C-Suite Edition

23rd of October 2025


Welcome to the Next IT Security – C-Suites Edition, the most EXCLUSIVE cyber security event in the world, where we will bring together cybersecurity leaders and experts from the Nordic to share knowledge and insights on the latest trends and technologies in the field. 

In this edition of C-Suites we will delve with some interesting business critical topics.

  • Collaboration, Communication & Trust in Cybersecurity
    With growing tech complexity, can traditional trust-based methods enhance security?
    Rebuilding interpersonal trust may be the missing link in modern cybersecurity strategy.
  • The Weakest Link in Your Organization
    Is your supply chain more vulnerable than your employees?
    Understanding where your weakest link lies is crucial for building true resilience.
  • Are You Ready for Hacktivists and Nation-States?
    Nordic infrastructure is increasingly in the crosshairs of sophisticated cyber threats.
    Early detection and proactive defense are essential to protecting national interests.
  • 2026 & Beyond
    The future of cybersecurity is shaped by AI, regulation, and cloud evolution.
    Anticipating tomorrow’s risks today gives organizations a critical edge.
  • AI Security Culture
    Employees may unknowingly misuse AI tools, creating hidden risks.
    Establishing clear guidelines and training is vital to reduce AI-related vulnerabilities.

Next IT Security aims to equip our readers with insights into the forefront of cybersecurity, where adaptation and innovation are indispensable in safeguarding the digital frontier. 

Our goal is to create a collaborative environment where cybersecurity C-Suites can exchange ideas and best practices.

Agenda

08:00

Registration

08:15

Power Breakfast

Spark meaningful conversations with peers over a curated breakfast. Exchange perspectives on building cyber defenses for tomorrow’s threats.

08:55

Firestarter Rubrik

09:00

  •  Examine the evolving tactics of hacktivists and state-sponsored cyber actors targeting critical infrastructure across the Nordics and globally, viewed through the operational and technological insights of INTERPOL’s Cyberspace and New Technologies Laboratory.

  • Explore how emerging technologies — including AI, quantum computing, 3D-printed weapons, and deepfakes — are transforming both the threat landscape and global cybersecurity responses.

  • Gain practical perspectives on how law enforcement innovation is shaping cyber defense strategies, and how organizations can align with these approaches to boost their own resilience and regulatory readiness.

  • Understand the real-world consequences of unpreparedness — from systemic shutdowns to reputational fallout — and learn what proactive, cross-border collaboration and technology-driven prevention can look like in practice.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory
INTERPOL

09:25

  • Shadow AI & Unintended Data Exposure – How employees unknowingly leak sensitive information through AI tools and what companies can do to mitigate the risks.
  • Balancing Innovation & Security – Strategies for enabling AI-driven productivity without compromising cybersecurity and compliance.
  • The Human Factor in AI Security – Why security awareness training must evolve to address AI misuse and insider threats.

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

Sharon Larsson

CISO
Sveska Spel

Amit Sharma

Cyber Security Officer
ASR

Siegfried Moyo

Author & Director, IT Security – (Deputy CISO)
Americold Logistics, LLC

10:00

  • AI coding assistants like Microsoft Copilot and ChatGPT are revolutionizing software development—much like open source did over the past decade. But with innovation comes responsibility. The use of AI-generated code introduces new challenges, particularly around application security, code quality, and intellectual property.

    Is your team equipped to adopt AI safely and effectively?

    Join Lucas von Stockhausen as he explores the key risks of integrating AI coding tools into your development workflows. Learn what safeguards are essential to ensure secure, high-quality applications—and how to confidently manage the risks of AI-generated code.

Lucas von Stockhausen

Executive Director, Application Security Engineering Black Duck

10:20

Firestarter Hadrian

10:25

Coffee Break & 1-1 meetings

An exclusive opportunity for focused discussions and strategic one-on-one meetings with top-tier account partners, fostering deeper collaboration and meaningful business insights.

10:55

In today’s cybersecurity landscape, leaders face a paradox: more tools and more alerts, yet less clarity. With fragmented visibility and overwhelming data, it’s increasingly complex to answer the one question that matters most: Where are we truly at risk?

In this session, XM Cyber cuts through the noise to demonstrate how modern attackers exploit real-world vulnerabilities, not just theoretical ones. We’ll explore how to move beyond static risk scores and siloed findings to a unified, attacker-centric view of your environment.

You’ll discover how to distinguish between noise and genuine threats by understanding which exposures truly matter -and why. We’ll demonstrate how to transition from reactive firefighting to strategic decision-making by assessing risk in the same manner as attackers do. We’ll discuss how security leaders can drive meaningful risk reduction by aligning security efforts with business impact, rather than just technical severity.

Join us to see how leading security teams are evolving from reactive patching to strategic exposure management – and walk away with a clearer path to prioritised, business-driven defence.

Tobias Traebing

VP – Global Sales Engineering
XM Cyber

11:20

  •  Build resilient teams by aligning employee behavior with security goals through practical behavioral strategies.

  • Improve decision-making under pressure by embedding security awareness and rapid response habits across all levels.

  • Prevent critical vulnerabilities caused by human error, disengagement, or unclear accountability in times of crisis.

Tobias Ander

Manager IT Security
Försvarsmakten (Swedish Armed Forces)

11:45

  • Discussing the risks of Cloud Mirage, where businesses believe their cloud infrastructure is secure, but hidden vulnerabilities remain, especially in multi-cloud environments.
  • Examining the challenges of securing data and applications across multiple cloud platforms, with a focus on gaps in visibility and centralized control.
  • Exploring strategies for managing emerging threats in multi-cloud environments and avoiding the false sense of security created by Cloud Mirage.

Moderator: Jake Martens

CISO
Upwind

Jan Olsson

Kriminalkommisarie / Police Superintendent
Swedish National Police SC3

Mikael Varverud

CISO
Iptor

Aki Khan

CISO
WSP Sverige

Georgios Kryparos

CISO
Einride

12:15

Firestarter KnowBe4

12:20

Lunch Break

A break for lunch and further informal networking.

13:15

In today’s rapidly evolving threat landscape, AI-enabled attackers are accelerating the speed and sophistication of cyber threats, outpacing reactive security solutions. Metrics of breaches, vulnerabilities, and time to exploit highlight the failure of defensive strategies alone. Offensive security flips the script, proactively simulating real-world attacks at scale to uncover root causes and reduce risk. This session explores how the future of offensive testing reveals not only vulnerabilities, but also why they’re created in the first place.

Chris Brown

VP EMEA
Synack

13:40

  • Explore how combining traditional trust-building methods with modern cybersecurity technologies can strengthen an organization’s defenses against evolving cyber threats.
  • Discuss how blending traditional communication practices with advanced cybersecurity tools can foster better collaboration and improve response to incidents..
  • A look at why human trust, collaboration, and communication are essential in creating a resilient cybersecurity strategy, even in a world dominated by technological solutions.

Moderator: Roberta Mladenovic

Regional Director
XM Cyber

Magnus Carling

CISO
Stena AB

Thomas B. Zuliani

Global CISO
Arla Foods

14:15

  • A comprehensive approach to identifying and mitigating the risks associated with employee use of AI technologies in the workplace. This session will provide actionable insights into creating a security framework tailored to AI applications.
  • Learn how to develop a security-first culture around AI usage, ensuring that employees are aware of potential risks and equipped with the right tools to prevent accidental misuse, leading to stronger protection for your organization.
  • This session moves away from theoretical risks and focuses on practical, real-world solutions to secure AI technologies within your organization. Explore effective measures that can be implemented today to prevent security breaches caused by AI misuse.

Lakshmi Hanspal

Chief Trust Officer
Digicert

14:40

  • The presentation by Flavio Aggio outlines a human-centric cybersecurity strategy aimed at transforming human factors into competitive advantages for sustainable business growth, emphasizing the need for organizations to address vulnerabilities associated with human behavior.
  • It highlights the projected global cybercrime costs reaching $23 trillion by 2027, driven largely by human error, and stresses the importance of proactive measures such as AI-powered detection and zero trust architecture to mitigate these risks.
  • The proposed implementation roadmap includes comprehensive assessments, behavioral change programs, and continuous optimization through AI analytics, ultimately aiming for a measurable ROI and enhanced cybersecurity posture within 24 months.

Flavio Aggio

CISO
WHO (World Health Organisation)

15:00

Coffee Break

Another exclusive opportunity for focused discussions and strategic one-on-one meetings with top-tier account partners, fostering deeper collaboration and meaningful business insights

15:30

  • A comprehensive look into the evolution of cloud threats and the next-generation solutions designed to mitigate them. This session will explore the emerging cybersecurity challenges of the cloud landscape in 2026 and how organizations can proactively address them.
  • Gain insights into the latest developments in cloud security, with a focus on the tools and strategies necessary to protect your cloud infrastructure. Learn about cutting-edge technologies and best practices that will safeguard your organization against evolving threats.
  • Focusing on outdated security methods, this session emphasizes the proactive measures organizations must take now to stay ahead of emerging cloud threats. Understand the consequences of falling behind in the rapidly advancing cloud security space, and how to ensure long-term protection by embracing next-gen solutions.

Kjell Arne Yttervik

Nordics and CEE Security Channel
at Google

15:55

Join us to experience the future of cybersecurity—where Good AI outsmarts Bad AI. See how attackers use malicious AI in real-world scenarios, why traditional defenses can’t stop them, and how AI-native security empowers teams to detect and respond faster with greater precision and confidence.

Daniel Qvint

Enterprise Sales Engineer
Abnormal AI

16:20

Round Table Discussion
Collaboration, Communication & Trust in Cybersecurity
Is It Time to Return to Traditional Methods or to Put our Ultimate Trust in Advanced Technology?

Round table moderators:

Jonaz Kumlander

Chief Technology Officer
Avidly

Leon Rueda

CTO
Leia Health

Kasun Bandar

CISO
CCFP

Girish Venkatappa

Security Architect
Volvo Financial Services

Sissy Papageli

Head of Security Incident Management
Ericsson

Pär Kempe

CIO
Stockholm School of Economics

Teresa De Freitas

CIO
Futuraskolan AB

Maria Groth

Director Of Quality,
CISO & CSO
TECHNIA

17:00

Short walk from Grand Hotel to Cruise

17:20

Firestarter Threatlocker

17:25

  • The increasing complexity and interconnectedness of supply chains have introduced new risks. This discussion will examine the vulnerabilities that come with third-party vendors and interconnected systems, and how organizations can implement effective supply chain security strategies.
  • Employee behavior remains one of the top causes of cyber breaches. This point will focus on the importance of educating and training employees to recognize and respond to security threats, and the potential risks of neglecting security awareness programs.
  • The discussion will center on how organizations can manage both supply chain security and internal security awareness. Experts will provide insights on how to integrate solutions that address both threats simultaneously for a more resilient and secure organization.

Gianclaudio Moresi

CISO
Forbo Group

Team Blue

Surinder Lall

Board Member
at UK Government for Cyber Security

Team Red

17:50

Book signing by

Gianclaudio Moresi

"The Three Laws of Cybersecurity"
"Zero Trust Network - Zero Internet"

Tobias Ander

“Systematisk informationssäkerhet”

Magnus Carling

Third book in “Monster” Trilogy

18:00

Networking Dinner Cruise

The day concludes with a networking dinner, providing a final opportunity for in-depth discussions and the formation of new partnerships, complemented by evening entertainment, including live musicians, raffle prizes, and much more.

The Grand Hôtel in Stockholm has been home to celebrities, high-profile events and everyday bon-vivants since 1874. Situated in the best waterfront location imaginable, the hotel overlooks the Royal Palace and Gamla Stan, Stockholm’s old town. The Grand is also home to the classic Swedish Veranda restaurant, renowned for its traditional smörgåsbord, Mathias Dahlgren’s awarded restaurants and the spectacular Cadier Bar. 

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event