The ONLY Interactive Large-Scale Meeting in the Nordics

GRAND EDITION

Where Cybersecurity Leaders Shape the Future

 

Not a tech expo. Not a vendor circus.
A closed, strategic environment for the executives carrying the region’s cyber responsibility.

Join us to realign strategy, compare pressure, and define what comes next.

21st of May 2026

CONTRIBUTORS

Meet 100+ Power Players redefining the future at the Grand Event.

Andrew Byrd

NATO Communications and Information Agency

David Jacoby

Chairman

Steffen Oxenvad

Acting head of unit Complex cybercrime, Polismyndigheten

Anders Enqvist

Head Of Security, Swedish Navy

Emmanuel Kessler

Head of team partnership & outreach, EUROPOL

Why This Event Matters Now

AI Acceleration

AI agents, machine identities, and cloud-native systems are evolving faster than governance.

Model Gap

Most security models no longer reflect the realities CISOs face in 2026.

Real Insights

This summit brings the region’s top leaders together to examine what actually works today.

No Assumptions

Nordic cyber leadership cannot rely on assumptions.

High Stakes

CISOs must make high-impact decisions under AI risk, NIS2 pressure, and supply-chain complexity.


Peer Clarity

Here, you gain clarity from peers navigating the same operational and regulatory demands.



Candid Truths

Behind closed doors, leaders speak openly about AI governance gaps, identity drift, cloud misconfigs, workforce strain, and rising board expectations.

True Resilience

This is the only Nordic room built for those who carry real responsibility— a place to step out of firefighting and benchmark your resilience with the region.

Who This Event Is Built For

For You and Your
Cybersecurity Team

This summit is for leaders who:

Partners

This event is for companies that:

EXECUTIVES
0 +

THE INTEL ROOM

Intelligence Cyber Leaders
Use in Board Meetings

A live environment where you see how real attacks unfold, and how leaders respond under pressure.

Get fast insight into:

THE SHOW ROOM

Voices Shaping the Future of Cyber Defense

Explore a curated selection of cutting-edge security solutions, without the noise of a traditional expo.

See:

Vendors
0 +

Inside the Event

EVENT FORMAT

gallery20 (1)

Fireside chats

A defender of the law (NATO, INTERPOL, or Swedish Police) sits down with a local hero CISO from a major organisation to debate, challenge, and dissect the day’s biggest security questions across three fast-paced fireside sessions.

gallery12 (1)

Roundtables

Where thought leaders speak honestly,
without recording or audience theatrics.



JelenaM

Innovator Keynotes

Thought leaders from leading solution providers deliver case-driven keynotes showing how organisations can overcome emerging challenges in 2026.


demo-room

Show Room

Curated, quiet, and built for real conversations - not noise.

networking-sessions

Executive networking sessions

Designed to create professional alliances that last beyond the event.

5

CyberPower Cruise
(Evening VIP Event)

Exclusive setting to connect with
other leaders off-stage.

One day. Zero fluff. Maximum clarity.

The Annual CyberPower Cruise

Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!

Still NOT convinced!?

We Innovate Cyber

Dear Delegate,

The enduring appeal of this platform lies in its unique ability to foster collaboration and innovation. Imagine brainstorming with your peers, even competitors, on business-critical topics and gaining actionable insights applicable to your own context.

Add to this mix top solution providers and C-level end users guiding the conversation, and you create an environment that challenges your thinking and pushes you to explore new possibilities. This platform offers a space to step back, reflect, and critically assess your security business's strengths, weaknesses, and future direction.

Grand IT Security has established itself as a leader in the cybersecurity industry, promoting insightful discussions and driving innovation. The event, which originated as a local think tank in Stockholm, has expanded significantly over the years. Today, it stands as a premier cybersecurity event that unites professionals from the IT, Cyber, and Information Security sectors, providing a platform for learning, sharing, and business opportunities.

Our mission at the Grand IT Security Summit is clear: to engage, support, and inspire the business community. We believe that the social debate and the conversation between the public and private sectors must continue, especially in these challenging times.
 
Our summit provides a unique platform for these vital discussions, with intimate roundtable sessions, keynote presentations from industry experts, and exciting interviews with thought leaders from around the world. We also offer ample networking opportunities to foster collaboration and innovation.
 
We invite you to join us at the Grand IT Security Summit and be part of this important conversation.
99%

Satisfied Delegates

Join us as we navigate the future of cybersecurity together.

Insights That Matter

CYBER NEWS

AI-Driven Threats & SOC Evolution

AI-Driven Threats & SOC Evolution

A Core Focus at The Grand IT Security | Stockholm 2026 Artificial intelligence is transforming both cyber attacks and defenses at unprecedented speed. AI-driven phishing campaigns, deepfake impersonations, and sophisticated…

Threat Landscape & Executive Concerns

Threat Landscape & Executive Concerns

A Core Focus at The Grand IT Security | Stockholm 2026 Over the past 12 months, the cyber threat landscape has undergone a dramatic transformation. Organizations are no longer facing…

Locking Down Automation: Protecting Secrets in AI & CI/CD Pipelines A Core Focus at The Grand IT Security | Stockholm 2026

Locking Down Automation: Protecting Secrets in AI & CI/CD Pipelines A Core Focus at The Grand IT Security | Stockholm 2026

As organisations accelerate AI adoption and continuous delivery, automated workflows and CI/CD pipelines have become mission-critical infrastructure. These systems enable rapid innovation, scalability, and operational efficiency, but they also depend…

When Machines enforce the law: Securing the next generation of Digital Officers

When Machines enforce the law: Securing the next generation of Digital Officers

As law enforcement accelerates its digital transformation, artificial intelligence, automation, and machine identities are reshaping policing—from predictive crime models to automated surveillance and digital evidence systems. These “non-human actors” increase…

AI, Cloud & Identity Security in the New Digital Era

AI, Cloud & Identity Security in the New Digital Era

A Core Focus at The Grand IT Security | Stockholm 2026 As Nordic enterprises accelerate their digital transformation, the convergence of AI, cloud adoption, and identity security has become both…

Preparing Law Enforcement for the Quantum Cyber Frontier

Preparing Law Enforcement for the Quantum Cyber Frontier

A Core Focus at The Grand IT Security | Stockholm 2026 As quantum computing advances, law enforcement and municipal IT departments are entering a new frontier of cybersecurity. These emerging…

Ransomware Without Borders: Building Supply-Chain Resilience for the Next Generation of Attacks

Ransomware Without Borders: Building Supply-Chain Resilience for the Next Generation of Attacks

A Core Focus at The Grand IT Security | Stockholm 2026 Ransomware has evolved beyond isolated attacks-it has become a global supply-chain crisis. In today’s hyperconnected digital economy, a single…

How to Adjust Your PAM Strategy for Growth

How to Adjust Your PAM Strategy for Growth

In today’s fast-paced, digital-first business environment, growth is an essential goal for any organization. However, with this growth comes an increasing need for security measures to protect sensitive information. One…

Tackling Cyber Threats in a Tech-Driven World

Tackling Cyber Threats in a Tech-Driven World

In today’s tech-driven world, the rapid adoption of digital technologies has revolutionized industries, improved efficiency, and opened up new avenues for innovation. However, with these advancements comes a dark side:…

Unlocking the Secrets: Mastering Social Engineering Tactics!

Unlocking the Secrets: Mastering Social Engineering Tactics!

In cybersecurity, protecting sensitive data and maintaining system integrity often requires more than just implementing firewalls or encryption methods. One of the most cunning and dangerous threats organizations face today…

The Rise of State-Sponsored Attacks

The Rise of State-Sponsored Attacks

Cybersecurity has become a critical component of national security in the digital age. While individuals and private organizations often focus on protecting their data and assets from cybercriminals, an emerging…

Uncovering the Hidden Danger: Insider Threats in Your Organization

Uncovering the Hidden Danger: Insider Threats in Your Organization

In the modern world of cybersecurity, the most dangerous threats often come from within an organization. Insider threats have become one of the most insidious risks businesses face, as they…

Navigating Third Party Exposure Risks in 2025

Navigating Third Party Exposure Risks in 2025

Organizations rely on third-party vendors and partners for various services and operations in today’s interconnected business environment. While these external relationships provide opportunities for growth and efficiency, they also introduce…

Why Cyber Awareness Must Be a Continuous Commitment

Why Cyber Awareness Must Be a Continuous Commitment

Cybersecurity has become a top priority for individuals, businesses, and governments in the ever-evolving digital landscape. As the frequency and sophistication of cyberattacks continue to rise, organizations must recognize that…

Emerging Technologies and the New Age of Cybersecurity

Emerging Technologies and the New Age of Cybersecurity

The digital age has drastically transformed how businesses, governments, and individuals interact with technology. While these advancements have ushered in increased connectivity and convenience, they have opened the door to…

Zero-Trust Security: The Most Effective Mantra When It Comes to Digital Protection

Zero-Trust Security: The Most Effective Mantra When It Comes to Digital Protection

Understanding Zero-Trust Security: The Foundation of Digital Protection In today’s digital landscape, traditional security models that rely on perimeter defenses are no longer sufficient. With the rise of cyber threats,…

Unlocking the Hidden Dangers: How Poor Cyber Hygiene Could Be Your Biggest Risk

Unlocking the Hidden Dangers: How Poor Cyber Hygiene Could Be Your Biggest Risk

The Silent Threat: What is Poor Cyber Hygiene? In today’s hyper-connected digital world, cyber threats lurk around every corner. Many believe cybersecurity is only a concern for large corporations, but…

Phishing Frenzy: Don’t Take the Bait!

Phishing Frenzy: Don’t Take the Bait!

The digital world has brought convenience, efficiency, and global connectivity, but it has also given rise to one of the most persistent cyber threats—phishing. Cybercriminals have perfected their deceptive techniques,…

AI Cyber Threats: Exploring the Emerging Frontier of Digital Threats!

AI Cyber Threats: Exploring the Emerging Frontier of Digital Threats!

Artificial Intelligence (AI) transforms the digital landscape, enabling rapid advancements in cybersecurity, automation, and business operations. However, just as AI is revolutionizing industries, it is also creating new security risks.…

New Threat: Ransomware Triple Extortion

New Threat: Ransomware Triple Extortion

Ransomware has evolved significantly over the past few years, with cybercriminals continually developing new tactics to increase their chances of success. Initially, ransomware simply involved encrypting a victim’s files and…

Infiltration of Malicious Code into Trusted Software Packages

Infiltration of Malicious Code into Trusted Software Packages

In the modern digital age, software packages are fundamental to the day-to-day operations of businesses, governments, and individuals. These software packages form the backbone of countless processes, from operating systems…

5G Cybersecurity Networks Broaden the  Attack Surface

5G Cybersecurity Networks Broaden the Attack Surface

The rollout of 5G networks is ushering in a new era of connectivity, offering faster speeds, lower latency, and the ability to support millions of devices simultaneously. These advancements promise…

The Importance of Control and Visibility in the Cloud

The Importance of Control and Visibility in the Cloud

As businesses and organizations increasingly embrace cloud computing, the significance of maintaining control and visibility over cloud environments becomes more apparent. Cloud services offer vast benefits, including cost savings, scalability,…

Cybersecurity in the cloud: Biggest Challenges

Cybersecurity in the cloud: Biggest Challenges

In today’s rapidly evolving digital landscape, cloud computing has become a powerful and essential tool for businesses, individuals, and organizations. The benefits are undeniable: scalability, cost efficiency, flexibility, and accessibility.…

The Evolving Threat of Ransomware: A Growing Menace in the Digital Age

The Evolving Threat of Ransomware: A Growing Menace in the Digital Age

Ransomware has become one of our most significant cyber threats, evolving from a niche nuisance to a global crisis. With attackers employing increasingly sophisticated tactics, the threat of ransomware continues…

Quantum Computing: The Power to Transform or the Code to Catastrophe?

Quantum Computing: The Power to Transform or the Code to Catastrophe?

Quantum computing is one of the most revolutionary technological advancements of the 21st century, promising to solve problems beyond classical computers’ reach. By leveraging the principles of quantum mechanics, quantum…

The Persistent Threat of Ransomware: Is It Here to Stay?

The Persistent Threat of Ransomware: Is It Here to Stay?

In the ever-evolving world of cybersecurity threats, few have caused as much concern as ransomware. This cyberattack has evolved dramatically over the past decade, becoming one of the most destructive…

AI Apocalypse: The Future of Cyber Attacks in the Age of Artificial Intelligence

AI Apocalypse: The Future of Cyber Attacks in the Age of Artificial Intelligence

The rapid growth of artificial intelligence (AI) has led to a world filled with opportunities. AI promises advancements in virtually every field, from medicine and engineering to finance and entertainment.…

Technology Risks are Part of Technology That Lifts Us to Cloud Nine

Technology Risks are Part of Technology That Lifts Us to Cloud Nine

Technology has undoubtedly transformed our lives in unimaginable ways only a few decades ago. From making communication instantaneous to enabling access to vast amounts of information at the touch of…

Supply Chain 2025: Riding the Tech Wave into Tomorrow

Supply Chain 2025: Riding the Tech Wave into Tomorrow

The global supply chain is undergoing a massive transformation driven by technological advancements, automation, and new economic dynamics. “Supply Chain 2025” is more than just a concept; it is a…

Techtacular Innovations: The Future Unfolds!

Techtacular Innovations: The Future Unfolds!

The world is evolving unprecedentedly, and technology is the driving force behind this transformation. “Techtacular innovations”—a term that encapsulates groundbreaking advancements in various technological sectors—are shaping the future in ways…

Phishing Attacks : Navigating the Rising Tide of Cyber Scams

Phishing Attacks : Navigating the Rising Tide of Cyber Scams

In the vast ocean of cyber threats, phishing remains one of the most pervasive and dangerous. Like a cunning predator lurking beneath the surface, phishing attacks deceive individuals and organizations,…

Europe’s Battle Against the Cyber Menace: Strengthening Defenses in a Digital Age

Europe’s Battle Against the Cyber Menace: Strengthening Defenses in a Digital Age

Cybersecurity has become a top priority for nations, businesses, and individuals in an increasingly interconnected world. As a global leader in technology and innovation, I am no stranger to the…

6G Unplugging: Navigating the Network of the Future

6G Unplugging: Navigating the Network of the Future

As the world continues to embrace the transformative power of 5G, the next generation of wireless technology—6G—is already on the horizon. Promising unprecedented speeds, ultra-low latency, and seamless connectivity, 6G…

Cyber Hygiene in the New Age of AI: Safeguarding the Digital Frontier

Cyber Hygiene in the New Age of AI: Safeguarding the Digital Frontier

As artificial intelligence (AI) continues to revolutionize industries and reshape the digital landscape, the importance of cyber hygiene has never been more critical. Cyber hygiene AI refers to the practices…

Embracing the Zero Trust Mindset: A New Era of Cybersecurity

Embracing the Zero Trust Mindset: A New Era of Cybersecurity

In an age where cyber threats are becoming increasingly sophisticated and pervasive, traditional security models are no longer sufficient to protect sensitive data and systems. The Zero Trust mindset represents…

EU AI Rules: Can Bots Follow the Law, or Will They Break It?

EU AI Rules: Can Bots Follow the Law, or Will They Break It?

Artificial Intelligence (AI) transforms industries, drives innovation, and reshapes our lives and work. However, as AI technologies become more pervasive, concerns about their ethical and legal implications have grown. In…

Cybersecurity CISOs Awareness: Uniting CISOs and the Boardroom for Stronger Security

Cybersecurity CISOs Awareness: Uniting CISOs and the Boardroom for Stronger Security

From Cybersecurity CISOs angle, in today’s digital-first world, cybersecurity is no longer just an IT issue—it’s a business imperative. As cyber threats grow in scale and sophistication, organizations must adopt…

Cybersecurity Vigilance Never Ends!

Cybersecurity Vigilance Never Ends!

In today’s hyper-connected world, digital transformation is reshaping industries and daily life; cybersecurity has become a cornerstone of organizational and personal safety. However, the threat landscape constantly evolves, with cybercriminals…

Misconfigurations, Inadequate Access Controls, and Vulnerabilities in Cloud Infrastructure

Misconfigurations, Inadequate Access Controls, and Vulnerabilities in Cloud Infrastructure

The shift to cloud computing has transformed business operations by providing scalability, flexibility, and cost-efficiency. However, as organizations increasingly depend on cloud infrastructure, they encounter significant security challenges. Misconfigurations, inadequate…

Tackling the Weak Spots in 5G Fortress

Tackling the Weak Spots in 5G Fortress

The rollout of 5G technology has ushered in a new era of connectivity, promising faster speeds, lower latency, and the ability to support a vast array of connected devices. However,…

Zero-Trust Architecture: Redefining Security in the Digital Age

Zero-Trust Architecture: Redefining Security in the Digital Age

In an era where cyber threats are becoming increasingly sophisticated and pervasive, traditional security models are no longer sufficient to protect sensitive data and systems. Enter ZTA, a revolutionary approach…

Battling the Bugs of Poor Cyber Hygiene!

Battling the Bugs of Poor Cyber Hygiene!

Maintaining cyber hygiene is more important than ever in today’s digital age when technology permeates every aspect of our lives. Neglecting basic cybersecurity practices can leave individuals and organizations vulnerable…

Strengthening End-to-End Security for a Resilient Supply Chain

Strengthening End-to-End Security for a Resilient Supply Chain

In today’s interconnected and digitized world, supply chains are the backbone of global commerce. However, as supply chains grow in complexity, they become more vulnerable to a wide range of…

Sophisticated Phishing Attacks in the Nordics: How to Strengthen the Defence Chain

Sophisticated Phishing Attacks in the Nordics: How to Strengthen the Defence Chain

Phishing attacks have become increasingly sophisticated, and the Nordics are no exception to this global trend. As one of the most digitally advanced regions in the world, the Nordics are…

Harnessing Cybersecurity Emerging Technologies for Sustainable Business Growth

Harnessing Cybersecurity Emerging Technologies for Sustainable Business Growth

In an era of rapid technological advancements, businesses are increasingly turning to cybersecurity emerging technologies to drive innovation, efficiency, and sustainable growth. From artificial intelligence (AI) and the Internet of…

Defending Against AI-Powered Cyber Attacks: A Comprehensive Guide

Defending Against AI-Powered Cyber Attacks: A Comprehensive Guide

In today’s digital age, the rapid advancement of artificial intelligence (AI) has revolutionized industries, from healthcare to finance. However, this technological progress has also given rise to a new breed…

Ensuring Compliance with the Cyber Resilience Act (CRA) Amid Resource Limitations

Ensuring Compliance with the Cyber Resilience Act (CRA) Amid Resource Limitations

The Cyber Resilience Act (CRA) is a landmark piece of legislation designed to strengthen cybersecurity across the European Union (EU). It mandates that organizations, particularly those producing and distributing digital…

Join us on 21 May 2026 in Stockholm – inside the only interactive, large-scale cybersecurity event in the Nordics.

Andrew Byrd

NATO Communications and Information Agency

I’m a seasoned Cybersecurity and Operations Executive with a track record of leading complex technical initiatives that protect and enable mission-critical operations. With deep expertise in cyber defense, risk management, and information systems, I specialize in translating technical threats and solutions into strategic decisions that drive operational resilience for military and enterprise environments.

Throughout my career, I’ve built and led high-performing teams, shaped cybersecurity strategy across national and international defense landscapes, and guided executive leaders through evolving digital risk. I’m passionate about aligning cyber capabilities with organizational goals—whether through threat hunting, adversary emulation, or enterprise security modernization.

David Jacoby

Chairman

David Jacoby is one of Sweden’s most boldest hackers and IT security experts. He has over 25 years of experience in professional hacking and has won several awards both as a speaker and for his unique research and dedicated work to stop digital crime. In addition to his own research, he was one of the main hackers in HACKAD_ a Swedish TV show named “HACKAD_” where David and three colleagues have hacked Swedish companies live on the TV screen to show the complexity and necessity in issues such as IT security.

Anders Enqvist

Head Of Security, Swedish Navy

I have a total of 15 years of experience in the field of security, ranging from hands-on operational security roles to positions as a security officer, and currently as Head of Security at one of the largest government authorities. In my present role, approximately 99% of my work is dedicated to protective security.

I advocate an active and proactive approach to security management, where the focus—beyond compliance with laws, regulations, directives, policies, and procedures—is on close collaboration with the authority’s employees to ensure effective and integrated security practices.

Emmanuel Kessler

Chef d’équipe partenariat & sensibilisation - Head of team partnership & outreach at EUROPOL - EC3- CYBERCRIME CENTER

Emmanuel Kessler is a senior law-enforcement professional at Europol’s European Cybercrime Centre (EC3), where he serves as Head of Prevention & Outreach. Since joining Europol in 2020, he has led initiatives focused on cybercrime prevention, awareness-raising, stakeholder outreach, and public-private cooperation at the European and international levels. With over a decade of experience in international security and cybercrime cooperation, Emmanuel has worked extensively on EU affairs, strategic partnerships, and operational coordination. Prior to Europol, he held senior roles within the French Ministry of Interior, including Head of Staff at the National Cybercrime Unit (OCLCTIC) and Cyber Cooperation Officer in the Department of International Cooperation. His work bridges policy, operations, and engagement, supporting collective efforts to prevent cybercrime and strengthen resilience across the EU and beyond.

Mr. G

Founder

I provide C-level networking platforms within cyber security. With over 20 years of experience, I have successfully launched multiple events that have made the business world more secure. Additionally, I contribute to the strategic direction and growth of the cyber security industry. Me/team are passionate about leveraging technology to solve real-world problems helping our clients and stakeholders breathe easier.

SEE ALL UNIQUE TOPICS

Round Table Discussion

Mattias Wiklund

Regional CIO, Toyota Northern Europe

Moderator

As organizations increasingly deploy AI agents and autonomous systems, securing their identities throughout the lifecycle—from onboarding to decommissioning—has become critical. This session explores strategies for enforcing role-based access, automating credential management, and maintaining continuous policy compliance while enabling AI systems to operate efficiently.

  • Role-based access and automated credential lifecycle management.
  • Continuous monitoring for policy compliance.
  • Ensuring secure decommissioning of autonomous systems.
Surinder Lall

Head of Cyber Governance, Risk and Compliance, DMG Media

Moderator

Automated workflows and CI/CD pipelines often rely on high-value credentials and secrets that, if compromised, can lead to severe security incidents. This discussion covers practical approaches to securing keys, detecting anomalous activity, and enforcing least-privilege access without creating operational bottlenecks.

  • Detect and respond to anomalous credential usage.
  • Implement least-privilege access policies.
  • Secure CI/CD and AI automation pipelines without slowing innovation.
Sushil Shenoy

IT Security Specialist, VizRT

Moderator

AI-driven workflows can execute code autonomously, increasing operational efficiency but also introducing potential risks. This session focuses on containment strategies, sandboxing, real-time monitoring, and incident response planning to prevent rogue execution from causing disruption or damage.

  • Sandboxing and isolation strategies.
  • Real-time monitoring for unexpected behaviors.
  • Incident response protocols for AI-driven code execution.
Siegfried Moyo

Director, IT Security – (Deputy CISO), Americold Logistics, LLC

Moderator

As generative and predictive AI models are deployed across enterprises, understanding their provenance, training data, and deployment risks is essential. This session provides frameworks for model governance, data protection, and approval workflows to ensure responsible, auditable AI operations.

  • Track model provenance and lineage.
  • Prevent data leakage during training and inference.
  • Approval workflows for production deployment.
Moderator

To Be Announced

Moderator

Operating AI systems in live environments introduces dynamic risks. Learn how to define operational boundaries, integrate human oversight, and set up monitoring and alerting mechanisms that maintain both compliance and agility in high-stakes operations.

  • Define operational boundaries for autonomous agents.
  • Integrate human-in-the-loop review processes.
  • Alert and respond to compliance or behavioral deviations.
Moderator

To Be Announced

Moderator

AI agents often interact with sensitive data, making it vital to apply robust data protection strategies. This session explores encryption, tokenization, access governance, and audit trail practices to minimize exposure while enabling AI-driven decision-making.

  • Implement encryption, tokenization, and access controls.
  • Maintain comprehensive audit trails.
  • Reduce exposure through intelligent data governance policies.

Moderator

To Be Announced

Moderator

Autonomous systems can behave unpredictably, potentially creating self-propagating risks. This discussion covers behavioral anomaly detection, leveraging AI for threat intelligence, and implementing containment and rollback strategies to mitigate rogue AI actions.

  • Behavioral anomaly detection.
  • AI-assisted threat detection.
  • Containment and rollback strategies.
Elnaz Tadayon

Cybersecurity area manager, H&M

Moderator

Enterprises need to maintain security while avoiding lock-in with specific AI vendors. This session explores open standards, interoperability, and monitoring frameworks that ensure security and governance across multi-vendor AI environments.

  • Open standards and interoperable monitoring frameworks.
  • Cross-platform governance for multi-vendor environments.
  • Maintain security without sacrificing flexibility.
Bernard Helou

Cybersecurity Manager, Schibsted Media

Moderator

AI systems can occasionally act outside intended parameters, creating operational or security incidents. This session addresses detection, escalation, containment, and post-incident analysis to prepare teams for autonomous agent misbehavior.

  • Detection and escalation protocols.
  • Containment and mitigation strategies.
  • Post-incident analysis and lessons learned.

Payam Razifar

Information Security Specialist, Bravida

Moderator

Organizations must ensure AI operations comply with GDPR, the AI Act, and other regulations. This session explores embedding compliance controls into operational workflows, mapping regulatory requirements to AI systems, and preparing audit-ready evidence.

  • Map regulatory requirements to operational workflows.
  • Collect audit-ready evidence automatically.
  • Embed compliance controls into daily AI operations.
Daniel Westbom

IT Risk & Security Manager, SEB

Moderator

Christian Sahlén

Head of Security & Governance (CISO), TF Bank

Moderator

Compliance with multiple overlapping frameworks can be complex. This discussion covers aligning controls to business operations, avoiding duplication, and measuring effectiveness to achieve smooth regulatory alignment without sacrificing operational agility.

  • Map controls to business processes.
  • Eliminate duplicate efforts across frameworks.
  • Measure and track compliance effectiveness.
Moderator

To Be Announced

Moderator

Static audits are no longer enough. This session explores embedding continuous compliance and assurance into operations, enabling real-time monitoring, cross-team collaboration, and proactive gap resolution.

  • Automated evidence collection and dashboards.
  • Cross-team integration between IT, HR, and risk.
  • Rapid identification and resolution of compliance gaps.
Brett Hardman

CISO, Cabonline

Moderator

Manual compliance processes create inefficiencies and increase risk. Learn how to integrate IT and HR systems to automate evidence collection, streamline reporting, and enforce consistent policies.

  • Standardized data formats for reporting.
  • Integrations for real-time audit evidence.
  • Streamlined cross-functional reporting workflows.
Moderator

To Be Announced

Moderator

Translating AI regulations into actionable enterprise controls is essential. This session provides practical strategies for risk categorization, documentation, and inspection readiness for AI systems.

  • Categorize AI systems by risk level.
  • Implement transparency and documentation measures.
  • Prepare for regulatory inspections proactively.
Staffan Fredriksson

CISO,
Regent AB

Moderator

Henrik Tholsby

CISO, Danderyds sjukhus

Moderator

Striking a balance between operational efficiency and regulatory compliance is critical. This session highlights prioritization frameworks, automation tools, and performance measurement to achieve both goals.

  • Prioritize high-risk areas for oversight.
  • Delegate through automation to reduce bottlenecks.
  • Measure risk-adjusted operational performance.
Moderator

To Be Announced

Moderator

Organizations operating internationally must manage overlapping regulations. This session discusses frameworks to map obligations, assess risk priorities, and coordinate cross-border compliance.

  • Map local and global obligations.
  • Assess regional vs enterprise risk priorities.
  • Coordinate cross-border compliance initiatives.
Anders Johansson

CISO, Alfa eCare Group

Moderator

Mergers and acquisitions present unique compliance risks. Learn how to embed security and regulatory due diligence throughout the transaction lifecycle.

  • Pre-merger cybersecurity and privacy assessments.
  • Post-merger policy harmonization.
  • Address legacy systems and compliance gaps.
Jan Olsson

Kriminalkommisarie / Police Superintendent, Swedish National Police SC3

Moderator

Hybrid work increases complexity in maintaining compliance. This session focuses on policies, monitoring, and cultural strategies for securing distributed teams without reducing agility.

  • Endpoint and remote access controls.
  • Policy enforcement across multiple locations.
  • Promote a security and compliance-first culture.
Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Moderator

Leaders need measurable insights into organizational resilience. This session covers dashboards, automated alerting, and reporting frameworks for operational and compliance metrics.

  • Dashboards for key resilience indicators.
  • Automated alerts for control failures.
  • Documentation for leadership and regulators.
Victor Pettersson

CISO, Sokigo

Moderator

Sarbjit Singh

CISO, Mentimeter AB

Moderator

True compliance is cultural. This discussion explores leadership messaging, incentives, and integrating security and compliance principles into everyday workflows.

  • Leadership messaging and advocacy.
  • Incentivize proactive reporting.
  • Integrate compliance into everyday business processes.
Helene Neuss

Information Security Strategist, Länsförsäkringar Bank

Moderator

Gamze Zengin

Head of information security,
Intel Law

Moderator

Skilled cybersecurity professionals are in high demand. This session explores strategies for recruitment, career development, and retention to secure top talent in a competitive market.

  • Employer branding and recruitment strategies.
  • Career development pathways.
  • Retention programs for high-demand skills.
Helana Malm

Head of CSO Office | Deputy Head of Group Security & Cyber Defence, Chair of Women in Security, Swedbank

Moderator

Dzana Dzemidzic

BISO,
Swedbank

Moderator

Teams must be prepared for evolving threats, including AI-driven risks. Learn how to design training programs, simulations, and metrics for skill development.

  • AI security and automation-focused training.
  • Scenario-based simulations and exercises.
  • Skill tracking and competency measurement.
Johan Rosell

Head of Center for Cybersecurity, RISE

Moderator

Collaboration between sectors accelerates threat detection and response. Explore frameworks for intelligence sharing, coordinated response, and evaluating partnerships.

  • Share actionable intelligence securely.
  • Establish coordinated response frameworks.
  • Measure partnership effectiveness.
Jörgen Ottosson

CISO, BITS DATA

Moderator

Florin Chirilas

Local IT Security Officer, Vattenfall

Moderator

Incident response effectiveness relies on preparedness and coordination. This session highlights training, roles, and post-incident analysis to strengthen response capabilities.

  • Cross-functional training programs.
  • Clear escalation paths and role definitions.
  • Post-incident analysis and continuous improvement.
Jakub Pasikowski

Information Security Manager, IT Compliance, Avalanche Studios

Moderator

Human limitations impact security operations. Learn strategies to monitor stress, implement support programs, and build resilience.

  • Monitor workload and stress indicators.
  • Implement well-being and counseling programs.
  • Build resilience into operations.
Moderator

To Be Announced

Moderator

International teams require consistent policies and flexible execution. This session covers coordination, communication, and tool centralization for global operations.

  • Align policies globally while empowering local execution.
  • Define communication protocols across time zones.
  • Centralized tools with flexible deployment.
Marius Ebel

Cybersecurity Contextualist & Conceptualist, Bilfinger

Moderator

Anette Karlsson

CISO, Intrum

Moderator

Engage teams with hands-on learning and gamification to improve skill retention.

  • Simulation-based exercises and scenarios.
  • Incentives, leaderboards, and measurable engagement.
  • Track knowledge retention and skill improvement.
Moderator

To Be Announced

Moderator

Effective collaboration depends on streamlined tools and processes. Explore strategies to reduce tool fatigue, enable real-time coordination, and enhance teamwork.

  • Evaluate ticketing, SIEM, and collaboration platforms.
  • Avoid tool fatigue and duplication.
  • Enable real-time coordination and alerting.
Smeden Svahn

CISO,
Adda

Moderator

Niclas Kjellin

Cybersecurity Expert, Cloud Security Alliance

Moderator

Knowledge sharing strengthens resilience. Learn how to exchange actionable intelligence securely, standardize reporting, and maintain trust across organizations.

  • Threat intelligence and mitigation strategies.
  • Standardized reporting formats for partners.
  • Ensure confidentiality and trust frameworks.
Sümeyra Arda Çirpili

Cyber Security Project Manager, Rabobank

Moderator

Burakhan Tahmaz

European Group Information Security Officer, KYOCERA Document Solutions Europe

Moderator

Aligning security initiatives improves impact and efficiency. This session covers prioritization, coordination, and shared accountability across teams and sectors.

  • Coordinate timelines and goals across teams.
  • Identify overlapping initiatives and redundancies.
  • Establish shared accountability structures.