Stockholm

October 24, 2024

Click on the Fast Link buttons to learn more

October 2024 Edition Aftermovie

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Elevating Security Awareness with Advanced   Technologies: In Line with Nordics Digitalization Standards    Awareness

Quantum computing is becoming increasingly practical    and accessible with the latest innovations on the market

Unveiling the Vulnerable World of IoT: Cybersecurity on the    Edge

NIS2, DORA & GDPR are still influencing cybersecurity    landscape

Data loss and recovery, shared infrastructure    vulnerabilities and lack of control and visibility in cloud    environments

Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking
0 +

Keynotes

Craig Jones

Director Cybercrime at INTERPOL
Craig Jones is a seasoned cybersecurity professional with an extensive background in digital forensics and incident response. With over a decade of experience, Craig has honed his skills in addressing cyber threats and ensuring the resilience of organizations. Currently serving as the Cybercrime Director at INTERPOL, he leads global efforts to combat cybercrime, collaborating with law enforcement agencies, private sectors, and international partners. Craig's expertise lies in developing strategies to stay ahead of evolving cyber threats, making him a prominent figure in the ongoing battle for digital security.

Sarah Aalborg

CISO at Tivoli
Sarah is the CISO of Tivoli, a Danish amusement park. With over 25 years of IT experience, she has worked in IT support, security program management, organizational change management, and as an IT security professional. She has led multiple IT security programs, including compliance, technical implementations, risk management, and leadership reporting. Sarah specializes in using her knowledge of the human brain and behavioral sciences to engage and mitigate human risk, and implement secure behavior. She does this in her new book and on the blog on www.securebychoice.com

New lecture format: Fireside Chat Quarrel

Two regional Thought Leaders will defend their different points of view in front of you as representatives of the blue team and the red team. And after each completed topic, you will have the opportunity to declare whether you support the arguments of the red or blue team, by raising the racket"

Per Gustavsson

CISO Stratsys and Affiliate a Research Faculty, C4I & Cyber Center GMU
Per Gustavsson is a seasoned cybersecurity expert with a wealth of experience in threat analysis, risk assessment, and incident response. With a strong foundation in engineering and a deep passion for strengthening cybersecurity resilience, Per has been instrumental in developing innovative solutions to fortify organizations against cyber threats. His forward-thinking approach and unwavering dedication to cybersecurity excellence make him a dynamic contributor to the industry's ongoing advancement.

Zsolt Fabian

Group Cybersecurity Lead Byborg Enterprises
Zsolt is a seasoned cybersecurity professional with a career spanning over 15 years. As a Group Cybersecurity Lead, Zsolt has built robust security programs and assembled high-performing teams for some of the world's Top 100 high-traffic websites, technology companies and payment systems. With a dedication to cybersecurity he has significantly contributed to making the digital world a more secure space for everyone. Known for a strategic, data-driven approach, Zsolt's expertise in risk management and incident response has been instrumental in mitigating security threats for businesses of all sizes.

Kranti Kumar Dasari

Director - Security Operations & Incident Response
Nasdaq

Experienced Security Operations Engineer with a demonstrated history of working in the medical device industry. Skilled in Cloud and Application Security Architecture, CCSP, ISO 27001, GDPR, NIST, MITRE ATT&CK, Threat Hunting, Cloud Security, VAPT, and Malware Analysis. Strong information technology professional ThePowerMBA.

Jakob
Stenstave

CISO
The HCI Group

With a background as Naval officer for the last decade working as a Security Officer/Security Protection Officer/Data Protection Officer and Expert/Sr Project, Programme & Portfolio Manager with a Special interest in Security.- I’m always taking holistic view (Including Information, personal and physical Security), and weighing business value together with Security Risks.

Jan Olsson

Kriminalkommissarie
Polismyndigheten, Nationellt It-brottscentrun (SC3)

Fraud expert From the time at the police's national fraud center with 30 years of experience in police work and 14 years dedicated to Fraud. Since autumn 2018, more against complex cybercrimes at the Swedish Cybercrime Center (SC3). Lectures nationally and internationally on everything from Social Engineering complexity to Monetary threats and societal consequences of laxity around Cybercrime and Fraud.

Edward Asiedu

Senior Principal Security Strategist
DataBee by Comcast Technologies Solutions

Edward Asiedu is Senior Principal Security Strategist for Comcast Technology Solutions’ DataBee™ business in EMEA. Edward joined DataBee from Splunk, where he spent nearly seven years in professional services consulting and sales engineering for cybersecurity solutions. He has deep technical expertise and experience working with public and private sector security leaders, advising on both strategy and implementation. 

Sofia Staff Frederiksen

Head of Information Security
Apoteket AB

Description is being prepared...

Teresia Willstedt

CISO
MedMera Bank

Teresia has 25 years of experience in the tech sector, with the last 10 years focused on fintech. Since 2020, she has managed security controls, audits, and compliance regulations at MedMera Bank. With a blend of diligence and creativity, she fosters resilience and awareness within her company and among her colleagues.
When she’s not busy securing digital assets, Teresia immerses herself in improvisational theater, honing her quick thinking and spontaneity. This combination of technical expertise and artistic flair allows her to approach challenges with a fresh perspective.

Jan Öhman

Former CISO
Elisa Polystar

Description is being prepared...

Giovanni Söderman

Giovanni Söderman Vice President Global IT
Consilium Safety Group

Giovanni believes in always creating and outputting value and value can be defined, measured and quantified in a number of ways. Happy faces are one of them. Lets work smarter, not harder - lets share the passion and the compassion to build and deliver true value!

 

My fundamentals is:

- Understanding, caring and coaching.

- Leading by example, acting as a role model, mentor and peer.

- Rewarding positive culture, dedication and openness.

- Create an environment where we dare to falter, dare to make mistakes and always support exploration of new and possibly better ways.

Sharon Larsson

CISO
Svenska Spel

Originally from Ireland, and based in Sweden since 2006, I have been working within IT & Operations organisations for 20 years with a broad range of roles from technical to leadership & strategic positions. My background has spanned from driving change in large global companies to getting small start-ups off the ground, and has covered public institutions to private corporations and businesses. Information Security has been a primary focus for several years, where I take a hands-on approach in translating the various regulations and requirements into actions that are relevant to the business - keeping the human factor and people aspects central to driving a strong security culture.

Ola Pontén

CISO
SCA

With over 10 years of experience in information security, I have developed a strong expertise in cyber risk management, cyber security risk mitigation. I have also a background as a police officer and a computer scientist, which gives me a unique insight into computer crime, IT-forensics, and law enforcement investigation and interviewing. I have worked in international environments within UN and EU organizations, where I was responsible for extracting and analyzing digital evidence. Together with my teams, I have built resilient cyber security environments, handled complex incidents, and identified and mitigated cyber security risks. I am passionate about protecting data, systems, and people from cyber threats, and I strive to create a culture of security awareness and best practices.

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Lyzia is a seasoned expert shaping the cybersecurity landscape. His dynamic insights, as showcased in his works, demonstrate his commitment to fostering digital resilience. With a diverse background and extensive knowledge, he is a driving force in addressing emerging threats and empowering organizations to navigate complex security challenges.

Alan Lucas

CISO
Homefashion Group B.V.

A seasoned cybersecurity leader with a strong technical background in cybersecurity software engineering, cyber incident response, security operations, information security management, and cyber threat intelligence, Alan brings over a decade of expertise in the cybersecurity industry.

 

His technical acumen coupled with a strategic perspective, equips Alan with the comprehensive ability to guide organizations towards enhanced security and resilience. Alan leverages a complete cybersecurity portfolio for tackling all cybersecurity challenges, ensuring a proactive and effective approach to safeguarding organizations, as well as leading software engineering teams to develop secure internal and customer-facing software solutions.

Anders Björklund

CISO
Anticimex Group

Anders led Anticimex Group cybersecurity initiatives, shaping policies and guiding risk management strategies to protect company and client data. Maintaining a robust cybersecurity posture that meets business objectives, our Risk Appetite and regulatory standards.

Martin Karlsson

CISO
Quinyx

Martin is a seasoned cybersecurity professional with a diverse background in the field, boasting a successful career trajectory that has spanned various critical roles in information security.

Currently serving as the Chief Information Security Officer (CISO) at “Svensk e-identitet” (a company within the Visma group).

With a strong foundation as an Information Security Specialist, Martin honed his skills in risk assessment, vulnerability management, and security policy development.

He also has a background as a physical and digital penetration tester, uncovering vulnerabilities regarding social engineering, access control systems, IT-systems and applications.

He sees himself as an IT-professional with a passion to learn from people, problems, news, articles, and technology.

Nicola Sotira

Head of CERT
Poste Italiane

Head of CERT of Poste Italiane . It works in information security and networks and has gained

over twenty years of experience in international environments. He was involved in encryption

design and network security in the security area, working in complex infrastructures like mobile and

3G networks. He has collaborated with several magazines in the computer industry as a journalist,

contributing to disseminating security and legal and technical aspects. He has been teaching

security since 2005 at the Master in Network Security of Sapienza University and LUISS.

Member of the Association for Computing Machinery (ACM) since 2004 and promoter of

technological innovation, collaborates with several start-ups in Italy and abroad. Member of the

board of start-up companies where he participated in developing and designing services in the

mobile sector; General Manager of the Global Cyber Security Foundation GCSEC since 2016.

Martin Karlsson

CISO
Quinyx

Martin is a seasoned cybersecurity professional with a diverse background in the field, boasting a successful career trajectory that has spanned various critical roles in information security.

Currently serving as the Chief Information Security Officer (CISO) at “Svensk e-identitet” (a company within the Visma group).

With a strong foundation as an Information Security Specialist, Martin honed his skills in risk assessment, vulnerability management, and security policy development.

He also has a background as a physical and digital penetration tester, uncovering vulnerabilities regarding social engineering, access control systems, IT-systems and applications.

He sees himself as an IT-professional with a passion to learn from people, problems, news, articles, and technology.

Quote:  "I always aim to increase efficiency and simultaneously raise the level of security. I try to have a holistic view of things and problems

Jörgen Ottosson

CISO & DPO
Bits Data

Broadly interested in communication security, info/IT-security, intelligence, geopolitics, surveillance and privacy issues and have been involved in various projects pertaining to such areas, also noncommercial ones, including the PGP community in the early days of the "crypto wars" in the late 90'.

Earlier worked as a security expert in the swedish banking community, involved with PIN security, key management and ATMs. Do a fair amount of admin and maintenance on Linux-systems and firewalls/IDSes as well.

Lately also undertook some academic studies in IT forensics, data communications and some aspects of cryptography.

Dr. Martin J. Kraemer

Security Awareness Advocate
KnowBe4

Martin J. Kraemer is a Security Awareness Advocate at KnowBe4 Germany, the world's largest security awareness training and simulated phishing platform. He has over 10 years of research and industry experience in cybersecurity, with a focus on human-centered computing and privacy behavior. He leverages his expertise to develop thought leadership and educate business leaders and the public on the importance and challenges of cybersecurity. He holds a PhD in Cybersecurity from the University of Oxford, where he conducted research on communal privacy and security behaviors, cyber risk management, and systems security.

Klas Elmby

CIO
Semcon

With over 35 years in the IT industry, Klas Elmby brings a wealth of experience in development and network infrastructure to his role as a CIO, a position he has excelled in for the last 30 years. A Pentera user for 2.5 years, Elmby has firsthand knowledge of the platform's capabilities in identifying and closing security gaps. His approach emphasizes the importance of not just informing but educating stakeholders on cybersecurity, aiming to elevate their understanding and confidence in cybersecurity efforts within their organizations.

Snehal Antani

CEO and Co-Founder of
Horizon3 AI

Snehal Antani is CEO and Co-founder of Horizon3.ai. Prior to Horizon3.ai, he was a CTO in the United States Special Operations Command (USSOCOM), the CTO of Splunk, and a CIO within GE Capital. Snehal holds 18 patents granted by the USPTO in data processing, cloud computing, and virtualization.

Benny Lakunishok

CEO and Co-Founder
Zero Networks

Benny Lakunishok is Co-Founder and CEO of Zero Networks, the market leader in MFA-based Microsegmentation, and has more than a decade of experience in cybersecurity. He was part of the leadership team at Aorato, a disruptive detection platform eventually acquired by Microsoft. He led the product team at Microsoft that utilized the Aorato technology, as well as the team that integrated Microsoft’s acquisition of Hexadite into its portfolio. Prior to Aorato, Benny was Senior Premier Field Engineer for Microsoft and in the security team of an elite intelligence unit within the Israeli Defense Forces.   

Staffan Truvé

Co-Founder & Chief Technology Officer (CTO)
Recorded Future

Staffan Truvé is the co-founder and CTO of Recorded Future. He has co-founded over 15 software companies, including visualization pioneer Spotfire (acquired by Tibco) and Appgate (now Cryptzone) for network security. Staffan holds a PhD in computer science from Chalmers University of Technology. He has been a visiting Fulbright Scholar at MIT. He is a member of the Royal Swedish Academy of Engineering Sciences.

Alex Welin

Sales Engineer
XM Cyber

10+ years of experience in Cyber Security

 

XM Cyber specializes in Continuous Threat Exposure Management (CTEM), helping organizations proactively identify, prioritize, and mitigate cyber risks across their attack surface. CTEM covers areas like Active Directory Security, Vulnerability Management, Attack Path Analysis, and Cloud Security, providing a comprehensive defense. By offering insights into potential attack paths, we empower our customers to stay ahead of threats and protect their critical assets.

Partners

Welcome to the Next IT Security – C-Suites Edition, the most EXCLUSIVE cyber security event in the world, where we will bring together cybersecurity leaders and experts from the Nordic to share knowledge and insights on the latest trends and technologies in the field. 

In this edition of C-Suites we will delve with some interesting business critical topics.

  • Advanced New Technologies in the Service of Security Awareness: Explore how emerging technologies are reshaping Security Awareness programs, empowering organisations with novel tools and strategies.
  • Quantum Computing Takes Center Stage: Witness the practical accessibility of quantum computing with the latest market innovations, unravelling a new era of computational possibilities.
  • Unveiling the Vulnerable World of IoT: Embark on a journey to the edge of cybersecurity, where IoT vulnerabilities pose unprecedented challenges, and innovative solutions are paramount.
  • NIS2, DORA & GDPR Continuing Impact: Navigate the evolving landscape shaped by NIS2, DORA, and GDPR regulations, influencing cybersecurity strategies and compliance measures. 
  • Cloud Challenges – Data Loss, Shared Vulnerabilities, and More: Explore the complexities surrounding data loss and recovery, shared vulnerabilities in cloud environments, and the ongoing struggle for control and visibility in the cloud landscape.

Next IT Security aims to equip our readers with insights into the forefront of cybersecurity, where adaptation and innovation are indispensable in safeguarding the digital frontier. 

Our goal is to create a collaborative environment where cybersecurity C-Suites can exchange ideas and best practices.

Agenda

07:45

Registration & POWER BREAKFAST

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

08:35

  • Role of law enforcement: Craig’s presentation delves into how law enforcement, including organizations like INTERPOL, plays a vital role in preventing, detecting, and disrupting cybercrime on national, regional, and global scales.
  • Collaborative efforts and innovative strategies: Explore the collaborative efforts and innovative strategies employed by law enforcement agencies and public-private partnerships worldwide to safeguard digital infrastructure and combat cyber threats effectively.
  • International cooperation and capacity building: Gain insights into the proactive measures taken by law enforcement and other stakeholders to enhance international cooperation, information sharing, and capacity building, crucial for upholding the rule of law and combating cybercrime amid complex geopolitical dynamics.

Craig Jones

Director Cybercrime at INTERPOL

09:00

Outdated security models are no longer sufficient to protect modern enterprises. It’s time to rethink the fundamentals of your IT infrastructure.

A Zero Trust architecture offers a proactive approach to security, safeguarding your business by:

* Strengthening security: Implementing access controls and continuous verification to prevent unauthorized access and data breaches.

* Simplifying operations: Streamlining IT processes and reducing operational overhead through automation and centralized management.

* Building a resilient future: Adapting to evolving threats and emerging technologies while maintaining a strong security posture.

In this session, you will learn:

* How a Zero Trust architecture can protect your enterprise from today’s cyber threats.

* The steps to embark on your Zero Trust journey.

Sebastian Kemi

CISO
in Residence at Zscaler

09:25

  • Everything starts with awareness. A chain is only as strong as its weakest link. Don’t shy away from the new techniques emerging in the market. Embrace them and leverage them to your advantage—this is the path to success.
  • Awareness is your responsibility. If it’s not at a basic level, there are no excuses. You will be held accountable if something goes wrong. Therefore, you need to be both a manager and a psychologist, more than just a technician, and find appropriate ways to reach every individual. Use all resources available.
  • Trust is key to success in everything, both for people and technology. However, you must always maintain control and manage the business without relying 100% on any single solution. Leaders in their sectors understand this well, especially in alignment with the rigorous Nordics Digitalization Standards.

Kranti Kumar Dasari

Director - Security Operations & Incident Response
Nasdaq

Jakob Stenstave

CISO
The HCI Group

Jan Olsson

Kriminalkommissarie
Polismyndigheten, Nationellt It-brottscentrun (SC3)

Martin Karlsson

CISO
Quinyx

10:00

Having a successful security posture is more easily said than done. It takes a well-designed strategy for a host of multi-faceted parameters to come together to truly bring security to an organization.

Security Culture, being the ideas, customs, and social behaviors of an organization that influence security, is a powerful tool to help nurture and sustain that which keeps your organization safe.

In this session, we’ll be hearing from industry expert Jelle Wieringa about how you can use security culture to your advantage. Based on statistics from academic research, combined with real-world experience, you’ll hear everything you need to know to better understand what it can bring you and your organization.

In this session you will learn:

  • What defines a Security Culture;
  • How can you measure and better understand your existing security culture;
  • What are proven and practical ways to grow your security culture?

Dr. Martin J. Kraemer

Security Awareness Advocate KnowBe4

10:20

Coffee break and 1-1 meetings

10:50

Firestarter Sonatype

10:55

As organizations navigate the complexities of AI adoption, governance and compliance, and digital transformation, cloud security has become a strategic priority. The challenge is not just safeguarding data but leveraging security investments to unlock business value. In this session with Wiz, we’ll explore proven strategies for aligning cloud security with business objectives to drive ROI, operational efficiency, and innovation. Learn how advancing cloud security maturity can fuel growth, mitigate risk, and deliver a competitive edge in an increasingly digital economy.

Prateek Goel

Business Value Advisory
Wiz

11:20

  • How are organisations identifying the risk levels within their ICT dependencies?
  • What strategies have organisations been adopting to address third-party risk and contracts?
  • Do internal and external auditors accept reduction of controls according to risk?

Moderator: Edward Asiedu

Senior Principal Security Strategist
DataBee by Comcast Technologies Solutions

Sofia Staff Frederiksen

Head of Information Security
Apoteket AB

Teresia Willstedt

CISO
MedMera Bank

Jan Öhman

Former CISO
Elisa Polystar

Giovanni Söderman

Vice President Global IT
Consilium Safety Group

11:55

Join Klas Elmby, CIO at Semcon as he shares his journey to reduce exposure and manage security gaps with Automated Security Validation. He will reveal the challenges he faced and how he overcame them to increase his organization’s overall security posture.

Klas Elmby

CIO
Semcon and Daniel Grønbek Regional Leader at Pentera

12:15

Firestarter Illumio

12:15

Lunch Break

13:10

Firestarter Canonical

13:15

  • We are all aware that we shouldn’t click links in suspicious emails. Then why is it that we do so time and time again.

    In this speech we will dive into the human mind and take a look at how our psychology affects us and our colleagues and why mindless e-learnings does not change our behavior.

    With an easy 5 step framework you can map your risky behaviors, exchange them with secure behavior and even map your progress.

Sarah Aalborg

CISO
Tivoli

13:40

In the age of AI, where threat actors are starting to use AI, how is threat intelligence changing?

This talk will briefly cover the most important emerging AI-enabled threats, as well as a deep dive into how AI can enable real time threat intelligence, both empowering threat analysts and automating defences.

Staffan Truvé

Co-Founder & Chief Technology Officer (CTO)
Recorded Future

14:05

With a panel of Cyber Security Professionals from across Europe we will have an open discussion about how they perceive the Quantum thread to IT security : where is the threat coming from and how worried should we be? As they are responsible for Cyber Security in their respective organizations we will then ask them to share their perspective on how the threat should be handled in the years to come!

Moderator: Kaare Mortensen

Presales consultant
Thales

Martin Karlsson

CISO
Quinyx

Nicola Sotira

Head of CERT
Poste Italiane

Alan Lucas

CISO
Homefashion Group B.V.

Per Gustavsson

CISO
Stratsys and Affiliate a Research Faculty, C4I & Cyber Center GMU

14:40

Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE. Discover how autonomous pentesting helps find unknown weaknesses in your infrastructure before attackers do.

During this session, you’ll learn how organizations just like yours are using autonomous pentesting to:

  • Secure their supply chains to ensure they’re not accepting someone else’s risk.
  • Discover weaknesses in cloud implementations that could result in compromise.
  • Set up an early detection system for actual threats in the most high-risk areas.

Snehal Antani

CEO and Co-Founder of
Horizon3 AI

15:00

Coffee Break & 1-1 meetings

15:30

In today’s threat landscape, a multi-faceted cybersecurity strategy is crucial to blocking ransomware and halting lateral movement. By integrating network and identity segmentation both to IT assets and OT/IOT assets with network-layer MFA, organizations can establish a robust defense against attacks while securing unmanaged OT, IoT, and IIoT devices.

Join our interactive roundtable with Benny Lakunishok to discuss key components of a modern, zero trust architecture:

  • Microsegmentation: Effectively prevent lateral movement and ransomware attacks, safeguarding your network down to the asset level and unmanageable OT/IoT/IIoT devices.
  • Identity Segmentation: Enhance security with granular access controls based on user, device, and application identities, reducing your attack surface.
  • Network-Layer MFA: Leverage just-in-time MFA to block unauthorized access even if credentials are compromised.

 

Benny Lakunishok

CEO and Co-Founder
Zero Networks

16:30

Annual C-Suite Cruise

16:50

AI: A potential paradise alley for cybersecurity advancements, promising enhanced threat detection, automated response, and efficient risk mitigation. The road to a dystopian future: Concerns arise regarding AI’s susceptibility to manipulation, biases, and unintended consequences, posing new security challenges. Balancing innovation with caution: Embracing AI in cybersecurity requires careful consideration of ethical implications, regulatory frameworks, and proactive risk management strategies.

Per Gustavsson

CISO
Stratsys and Affiliate a Research Faculty, C4I & Cyber Center GMU

Team Blue

Zsolt Fabian

Group Cybersecurity Lead
Byborg Enterprises

Team Red

17:25

  • Targeting of Internet of Things (IoT) Devices. With the proliferation of IoT devices, cyber criminals will increasingly focus on exploiting their vulnerabilities
  • IoT devices often have weak security measures, making them attractive targets for hackers. We can expect attacks targeting smart homes, connected cars, and industrial IoT systems to become more prevalent.
  • With the widespread adoption of the internet of things (IoT) , compromise of devices can be used for data theft, botnets, or even physical damage in critical sectors.

Sharon Larsson

CISO Svenska Spel

Ola Pontén

CISO
SCA

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Anders Björklund

CISO
Anticimex Group

18:00

In Mergers and Acquisitions (M&A), cybersecurity emerges as a critical but often overlooked dimension. The talk explores the unique cybersecurity challenges that companies face during M&A transactions, emphasizing the role of the CISO and the security team. We will explore why traditional due diligence processes frequently fall short in adequately assessing risks and the strategies we can employ to manage risks under the pressure of tight deadlines and uncertainty. Using real-world examples and practical tips for effective risk mitigation, the talk aims to equip executives and CISOs with the tools necessary to navigate these high-stakes situations, ensuring a secure and beneficial outcome for all parties involved.

  • Due Diligence Challenges: Discuss the inherent weaknesses in M&A due diligence processes regarding technology and cybersecurity, and why these can lead to unexpected threats.
  • Strategies for CISOs: Proactive strategies and techniques for CISOs to enhance due diligence, have a wide view on risks while understanding the investment narrative and navigate throughout the process without surprises.
  • Post-Merger Integration: How to continue cybersecurity efforts after signing the deal, ensuring the progress of security and integration of the acquired target.

Zsolt Fabian

Group Cybersecurity Lead
Byborg Enterprises

18:20

Book signing by

Sarah Aalborg

CISO
Tivoli

18:40

Networking Dinner Cruise

Highly Exclusive. Operakällaren’s name dates back to 1787 when it was situated in the cellar under Gustav III’s opera house. History permeates the atmosphere in this heritage property, the most prestigious meeting place in Stockholm, is a house filled with opportunities, inspiration and fantastic networking.

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event