Cybersecurity Event

GRAND EDITION

The ONLY INTERACTIVE IMMERSIVE EXCLUSIVE

large scale event in the NORDICS

Unlike anything you’ve ever seen.
We guarantee a groundbreaking experience that you should not miss.

Trusted By:

Upcoming Event

Cybersecurity Starts Here.

Cybersecurity Conference & Event

GRAND EDITION

The ONLY INTERACTIVE

large scale event in the NORDICS

A Cybersecurity Conference unlike anything you’ve ever seen. We guarantee a groundbreaking experience that you should not miss.

Trusted By:

Upcoming Event

Cybersecurity 2026: Know It All

CONTRIBUTORS

Meet 100+ Power Players redefining the future at the Grand Event.

Jelena Zelenović Matone

Ciso of the Year, European Investment Bank

David Jacoby

Pwn Star

Mario Beccia

CIO, Nato

Thomas Zuliani

Global CISO, ARLA Foods

Andrew Byrd

NATO Communications and Information Agency

Steffen Oxenvad

Acting head of unit Complex cybercrime, Polismyndigheten

Innovation

Unveiling a Unique Approach to Cybersecurity.

The Grand Edition 2026 will feature 30 roundtable discussions, covering 30 unique topics organized under 3 critical focus areas for 2026, reflecting the latest challenges and opportunities in cybersecurity.

The discussions will be moderated by 60 industry experts and top-tier solution providers.

Power Players
0 +
Executives
0 +
Top Tier Vendors
0 +
INVALUABLE

The platform's ability to foster collaboration and innovation, along with the inclusion of top solution providers and C-level end users in a Round Table setting, makes it invaluable.

ADVANTAGE

Showcase your solution in the main DEMO room. Engage in 1-to-1 meetings in the meeting room. Take advantage of the networking opportunities, such as the Annual CyberPower Cruise and build strong connections with potential clients & partners.

Partnership Opportunities

Get an Appointment

The Annual CyberPower Cruise

Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!
Still NOT convinced!?

We Innovate Cyber

Dear Delegate,

The enduring appeal of this platform lies in its unique ability to foster collaboration and innovation. Imagine brainstorming with your peers, even competitors, on business-critical topics and gaining actionable insights applicable to your own context.

Add to this mix top solution providers and C-level end users guiding the conversation, and you create an environment that challenges your thinking and pushes you to explore new possibilities. This platform offers a space to step back, reflect, and critically assess your security business's strengths, weaknesses, and future direction.

Grand IT Security has established itself as a leader in the cybersecurity industry, promoting insightful discussions and driving innovation. The event, which originated as a local think tank in Stockholm, has expanded significantly over the years. Today, it stands as a premier cybersecurity event that unites professionals from the IT, Cyber, and Information Security sectors, providing a platform for learning, sharing, and business opportunities.

Our mission at the Grand IT Security Summit is clear: to engage, support, and inspire the business community. We believe that the social debate and the conversation between the public and private sectors must continue, especially in these challenging times.
 
Our summit provides a unique platform for these vital discussions, with intimate roundtable sessions, keynote presentations from industry experts, and exciting interviews with thought leaders from around the world. We also offer ample networking opportunities to foster collaboration and innovation.
 
We invite you to join us at the Grand IT Security Summit and be part of this important conversation.
99%

Satisfied Delegates

Join us as we navigate the future of cybersecurity together.

Latest Articles From NoLEDGE

When Machines enforce the law: Securing the next generation of Digital Officers

When Machines enforce the law: Securing the next generation of Digital Officers

As law enforcement accelerates its digital transformation, artificial intelligence, automation, and machine identities are reshaping policing—from predictive crime models to automated surveillance and digital evidence…

AI, Cloud & Identity Security in the New Digital Era

AI, Cloud & Identity Security in the New Digital Era

A Core Focus at The Grand IT Security | Stockholm 2026 As Nordic enterprises accelerate their digital transformation, the convergence of AI, cloud adoption, and…

Preparing Law Enforcement for the Quantum Cyber Frontier

Preparing Law Enforcement for the Quantum Cyber Frontier

A Core Focus at The Grand IT Security | Stockholm 2026 As quantum computing advances, law enforcement and municipal IT departments are entering a new…

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force

CISO of the year award for 2019, Luxembourg. The Global Cyber Sentinel Award Winner 2020 for immense contribution to cybersecurity domain globally. CISO of the year Europe 2021.

Versatile and innovative professional with emphasis on cyber security risk management, policies and procedures creation, IT/IS security, IT Operations, audit, risk mitigation, business process improvement and IT governance. Proven results in building internal and external client relationships, even at government levels for best cybersecurity practices, and driving growth in competitive and ever-changing markets. Proactive in assessing and responding to market and consumer trends. Highly effective at identifying and implementing business process improvements while safeguarding and adding to controls. Skilled at communicating effectively with clients, senior management and colleagues. Speaker at various events, such as UN, Risk.Net, RiskMinds, GISEC, etc.

Specialties: Cybersecurity, Policy development, IT Change and Incident Management development and implementation, IT Security, people management, SLA managment, Auditing financial systems, Risk management, Negotiations, Creative problem solver, Analytical thinker, Strong decision maker, Results driven, Innate ability to develop interpersonal relations, Proven leadership in all aspects of the workplace, Project Management, Risk Assessment & Mitigation, IT Governance & Stakeholder Liaison, Organizational Leadership & Change, COSO/COBiT Controls, Bloomberg, Microstrategy, Business Process Improvement, SOX, AutoAudit/Focus/SQL/Visio/ACL/MS Access, EBA, and ISO/IEC 27001:2013

David Jacoby

Pwn Star

David Jacoby is one of Sweden’s most boldest hackers and IT security experts. He has over 25 years of experience in professional hacking and has won several awards both as a speaker and for his unique research and dedicated work to stop digital crime. In addition to his own research, he was one of the main hackers in HACKAD_ a Swedish TV show named “HACKAD_” where David and three colleagues have hacked Swedish companies live on the TV screen to show the complexity and necessity in issues such as IT security.

Mario Beccia

Deputy CIO for Cybersecurity at NATO

Mario Beccia is NATO’s Deputy CIO for Cybersecurity, responsible for leading major cybersecurity transformation programs. He holds a degree in Economics and Management, an MBA in innovation management, and multiple IT and cybersecurity certifications (PMP, CISM, CISSP, among others).

His career began in 1997 with a start-up focused on web technologies. He later became an independent IT consultant before joining NATO in 2006. At NATO Allied Command Transformation, he contributed to key initiatives like the NATO Computer Incident Response Capability (NCIRC) and IT Modernization programs, as well as leading cybersecurity tracks in prominent NATO exercises and think tanks.

In 2015, he transitioned to the NATO Communications and Information Agency, furthering NATO’s cybersecurity infrastructure and fostering industry collaboration. He also served as Chief Information Security Officer at the European Defence Agency (2018–2021), spearheading cross-domain cybersecurity projects and organizing military CERT exercises.

Since 2021, Mario Beccia has been driving NATO’s enterprise cybersecurity strategy, ensuring coherence and enhanced ICT services across the organization.

Thomas Zuliani

Global Chief Information Security Officer

Thomas Zuliani is a seasoned cybersecurity expert and the Global Chief Information Security Officer (CISO) at ARLA Foods, with extensive experience in leading security strategies across multinational organizations such as Pandora, Vestas or Siemens. He has a proven track record in risk management, data protection, and securing global infrastructure. Passionate about driving innovation in cybersecurity, Thomas is committed to safeguarding the integrity of digital transformation and ensuring compliance with industry standards, which granted several awards and recognitions on the past years, such as

  • Top Global CISO in the World by Cyber Defense Magazine 2024
  • Best Global CISO Top100 by HotTopics 2023 & 2024
  • Top 3 Best CISO Denmark by ComputerWorld 2022

Board Memberships & Advisory Roles: Nordic CISO Governing Body (Evanta/Gartner), Executive Advisory Board (IDC, SailPoint and Orange Cyber Defense)

Mr. G

Founder

I provide C-level networking platforms within cyber security. With over 20 years of experience, I have successfully launched multiple events that have made the business world more secure. Additionally, I contribute to the strategic direction and growth of the cyber security industry. Me/team are passionate about leveraging technology to solve real-world problems helping our clients and stakeholders breathe easier.

SEE ALL UNIQUE TOPICS

Round Table Discussion

Moderator

To Be Announced

Moderator

As organizations increasingly deploy AI agents and autonomous systems, securing their identities throughout the lifecycle—from onboarding to decommissioning—has become critical. This session explores strategies for enforcing role-based access, automating credential management, and maintaining continuous policy compliance while enabling AI systems to operate efficiently.

  • Role-based access and automated credential lifecycle management.
  • Continuous monitoring for policy compliance.
  • Ensuring secure decommissioning of autonomous systems.
Moderator

To Be Announced

Moderator

Automated workflows and CI/CD pipelines often rely on high-value credentials and secrets that, if compromised, can lead to severe security incidents. This discussion covers practical approaches to securing keys, detecting anomalous activity, and enforcing least-privilege access without creating operational bottlenecks.

  • Detect and respond to anomalous credential usage.
  • Implement least-privilege access policies.
  • Secure CI/CD and AI automation pipelines without slowing innovation.
Moderator

To Be Announced

Moderator

AI-driven workflows can execute code autonomously, increasing operational efficiency but also introducing potential risks. This session focuses on containment strategies, sandboxing, real-time monitoring, and incident response planning to prevent rogue execution from causing disruption or damage.

  • Sandboxing and isolation strategies.
  • Real-time monitoring for unexpected behaviors.
  • Incident response protocols for AI-driven code execution.
Moderator

To Be Announced

Moderator

As generative and predictive AI models are deployed across enterprises, understanding their provenance, training data, and deployment risks is essential. This session provides frameworks for model governance, data protection, and approval workflows to ensure responsible, auditable AI operations.

  • Track model provenance and lineage.
  • Prevent data leakage during training and inference.
  • Approval workflows for production deployment.
Moderator

To Be Announced

Moderator

Operating AI systems in live environments introduces dynamic risks. Learn how to define operational boundaries, integrate human oversight, and set up monitoring and alerting mechanisms that maintain both compliance and agility in high-stakes operations.

  • Define operational boundaries for autonomous agents.
  • Integrate human-in-the-loop review processes.
  • Alert and respond to compliance or behavioral deviations.
Moderator

To Be Announced

Moderator

AI agents often interact with sensitive data, making it vital to apply robust data protection strategies. This session explores encryption, tokenization, access governance, and audit trail practices to minimize exposure while enabling AI-driven decision-making.

  • Implement encryption, tokenization, and access controls.
  • Maintain comprehensive audit trails.
  • Reduce exposure through intelligent data governance policies.

Moderator

To Be Announced

Moderator

Autonomous systems can behave unpredictably, potentially creating self-propagating risks. This discussion covers behavioral anomaly detection, leveraging AI for threat intelligence, and implementing containment and rollback strategies to mitigate rogue AI actions.

  • Behavioral anomaly detection.
  • AI-assisted threat detection.
  • Containment and rollback strategies.
Moderator

To Be Announced

Moderator

Enterprises need to maintain security while avoiding lock-in with specific AI vendors. This session explores open standards, interoperability, and monitoring frameworks that ensure security and governance across multi-vendor AI environments.

  • Open standards and interoperable monitoring frameworks.
  • Cross-platform governance for multi-vendor environments.
  • Maintain security without sacrificing flexibility.
Moderator

To Be Announced

Moderator

AI systems can occasionally act outside intended parameters, creating operational or security incidents. This session addresses detection, escalation, containment, and post-incident analysis to prepare teams for autonomous agent misbehavior.

  • Detection and escalation protocols.
  • Containment and mitigation strategies.
  • Post-incident analysis and lessons learned.

Moderator

To Be Announced

Moderator

Organizations must ensure AI operations comply with GDPR, the AI Act, and other regulations. This session explores embedding compliance controls into operational workflows, mapping regulatory requirements to AI systems, and preparing audit-ready evidence.

  • Map regulatory requirements to operational workflows.
  • Collect audit-ready evidence automatically.
  • Embed compliance controls into daily AI operations.
Moderator

To Be Announced

Moderator

Compliance with multiple overlapping frameworks can be complex. This discussion covers aligning controls to business operations, avoiding duplication, and measuring effectiveness to achieve smooth regulatory alignment without sacrificing operational agility.

  • Map controls to business processes.
  • Eliminate duplicate efforts across frameworks.
  • Measure and track compliance effectiveness.
Moderator

To Be Announced

Moderator

Static audits are no longer enough. This session explores embedding continuous compliance and assurance into operations, enabling real-time monitoring, cross-team collaboration, and proactive gap resolution.

  • Automated evidence collection and dashboards.
  • Cross-team integration between IT, HR, and risk.
  • Rapid identification and resolution of compliance gaps.
Moderator

To Be Announced

Moderator

Manual compliance processes create inefficiencies and increase risk. Learn how to integrate IT and HR systems to automate evidence collection, streamline reporting, and enforce consistent policies.

  • Standardized data formats for reporting.
  • Integrations for real-time audit evidence.
  • Streamlined cross-functional reporting workflows.
Moderator

To Be Announced

Moderator

Translating AI regulations into actionable enterprise controls is essential. This session provides practical strategies for risk categorization, documentation, and inspection readiness for AI systems.

  • Categorize AI systems by risk level.
  • Implement transparency and documentation measures.
  • Prepare for regulatory inspections proactively.
Moderator

To Be Announced

Moderator

Striking a balance between operational efficiency and regulatory compliance is critical. This session highlights prioritization frameworks, automation tools, and performance measurement to achieve both goals.

  • Prioritize high-risk areas for oversight.
  • Delegate through automation to reduce bottlenecks.
  • Measure risk-adjusted operational performance.
Moderator

To Be Announced

Moderator

Organizations operating internationally must manage overlapping regulations. This session discusses frameworks to map obligations, assess risk priorities, and coordinate cross-border compliance.

  • Map local and global obligations.
  • Assess regional vs enterprise risk priorities.
  • Coordinate cross-border compliance initiatives.
Moderator

To Be Announced

Moderator

Mergers and acquisitions present unique compliance risks. Learn how to embed security and regulatory due diligence throughout the transaction lifecycle.

  • Pre-merger cybersecurity and privacy assessments.
  • Post-merger policy harmonization.
  • Address legacy systems and compliance gaps.
Moderator

To Be Announced

Moderator

Hybrid work increases complexity in maintaining compliance. This session focuses on policies, monitoring, and cultural strategies for securing distributed teams without reducing agility.

  • Endpoint and remote access controls.
  • Policy enforcement across multiple locations.
  • Promote a security and compliance-first culture.
Moderator

To Be Announced

Moderator

Leaders need measurable insights into organizational resilience. This session covers dashboards, automated alerting, and reporting frameworks for operational and compliance metrics.

  • Dashboards for key resilience indicators.
  • Automated alerts for control failures.
  • Documentation for leadership and regulators.
Moderator

To Be Announced

Moderator

True compliance is cultural. This discussion explores leadership messaging, incentives, and integrating security and compliance principles into everyday workflows.

  • Leadership messaging and advocacy.
  • Incentivize proactive reporting.
  • Integrate compliance into everyday business processes.
Moderator

To Be Announced

Moderator

Skilled cybersecurity professionals are in high demand. This session explores strategies for recruitment, career development, and retention to secure top talent in a competitive market.

  • Employer branding and recruitment strategies.
  • Career development pathways.
  • Retention programs for high-demand skills.
Moderator

To Be Announced

Moderator

Teams must be prepared for evolving threats, including AI-driven risks. Learn how to design training programs, simulations, and metrics for skill development.

  • AI security and automation-focused training.
  • Scenario-based simulations and exercises.
  • Skill tracking and competency measurement.
Moderator

To Be Announced

Moderator

Collaboration between sectors accelerates threat detection and response. Explore frameworks for intelligence sharing, coordinated response, and evaluating partnerships.

  • Share actionable intelligence securely.
  • Establish coordinated response frameworks.
  • Measure partnership effectiveness.
Moderator

To Be Announced

Moderator

Incident response effectiveness relies on preparedness and coordination. This session highlights training, roles, and post-incident analysis to strengthen response capabilities.

  • Cross-functional training programs.
  • Clear escalation paths and role definitions.
  • Post-incident analysis and continuous improvement.
Moderator

To Be Announced

Moderator

Human limitations impact security operations. Learn strategies to monitor stress, implement support programs, and build resilience.

  • Monitor workload and stress indicators.
  • Implement well-being and counseling programs.
  • Build resilience into operations.
Moderator

To Be Announced

Moderator

International teams require consistent policies and flexible execution. This session covers coordination, communication, and tool centralization for global operations.

  • Align policies globally while empowering local execution.
  • Define communication protocols across time zones.
  • Centralized tools with flexible deployment.
Moderator

To Be Announced

Moderator

Engage teams with hands-on learning and gamification to improve skill retention.

  • Simulation-based exercises and scenarios.
  • Incentives, leaderboards, and measurable engagement.
  • Track knowledge retention and skill improvement.
Moderator

To Be Announced

Moderator

Effective collaboration depends on streamlined tools and processes. Explore strategies to reduce tool fatigue, enable real-time coordination, and enhance teamwork.

  • Evaluate ticketing, SIEM, and collaboration platforms.
  • Avoid tool fatigue and duplication.
  • Enable real-time coordination and alerting.
Moderator

To Be Announced

Moderator

Knowledge sharing strengthens resilience. Learn how to exchange actionable intelligence securely, standardize reporting, and maintain trust across organizations.

  • Threat intelligence and mitigation strategies.
  • Standardized reporting formats for partners.
  • Ensure confidentiality and trust frameworks.
Moderator

To Be Announced

Moderator

Aligning security initiatives improves impact and efficiency. This session covers prioritization, coordination, and shared accountability across teams and sectors.

  • Coordinate timelines and goals across teams.
  • Identify overlapping initiatives and redundancies.
  • Establish shared accountability structures.