
Regional CIO, Toyota Northern Europe
As organizations increasingly deploy AI agents and autonomous systems, securing their identities throughout the lifecycle—from onboarding to decommissioning—has become critical. This session explores strategies for enforcing role-based access, automating credential management, and maintaining continuous policy compliance while enabling AI systems to operate efficiently.

Head of Cyber Governance, Risk and Compliance, DMG Media
Automated workflows and CI/CD pipelines often rely on high-value credentials and secrets that, if compromised, can lead to severe security incidents. This discussion covers practical approaches to securing keys, detecting anomalous activity, and enforcing least-privilege access without creating operational bottlenecks.

IT Security Specialist, VizRT
AI-driven workflows can execute code autonomously, increasing operational efficiency but also introducing potential risks. This session focuses on containment strategies, sandboxing, real-time monitoring, and incident response planning to prevent rogue execution from causing disruption or damage.

Director, IT Security – (Deputy CISO), Americold Logistics, LLC
As generative and predictive AI models are deployed across enterprises, understanding their provenance, training data, and deployment risks is essential. This session provides frameworks for model governance, data protection, and approval workflows to ensure responsible, auditable AI operations.
To Be Announced
Operating AI systems in live environments introduces dynamic risks. Learn how to define operational boundaries, integrate human oversight, and set up monitoring and alerting mechanisms that maintain both compliance and agility in high-stakes operations.
To Be Announced
AI agents often interact with sensitive data, making it vital to apply robust data protection strategies. This session explores encryption, tokenization, access governance, and audit trail practices to minimize exposure while enabling AI-driven decision-making.
To Be Announced
Autonomous systems can behave unpredictably, potentially creating self-propagating risks. This discussion covers behavioral anomaly detection, leveraging AI for threat intelligence, and implementing containment and rollback strategies to mitigate rogue AI actions.

Cybersecurity area manager, H&M
Enterprises need to maintain security while avoiding lock-in with specific AI vendors. This session explores open standards, interoperability, and monitoring frameworks that ensure security and governance across multi-vendor AI environments.

Cybersecurity Manager, Schibsted Media
AI systems can occasionally act outside intended parameters, creating operational or security incidents. This session addresses detection, escalation, containment, and post-incident analysis to prepare teams for autonomous agent misbehavior.

Information Security Specialist, Bravida
Organizations must ensure AI operations comply with GDPR, the AI Act, and other regulations. This session explores embedding compliance controls into operational workflows, mapping regulatory requirements to AI systems, and preparing audit-ready evidence.

IT Risk & Security Manager, SEB

Head of Security & Governance (CISO), TF Bank
Compliance with multiple overlapping frameworks can be complex. This discussion covers aligning controls to business operations, avoiding duplication, and measuring effectiveness to achieve smooth regulatory alignment without sacrificing operational agility.
To Be Announced
Static audits are no longer enough. This session explores embedding continuous compliance and assurance into operations, enabling real-time monitoring, cross-team collaboration, and proactive gap resolution.

CISO, Cabonline
Manual compliance processes create inefficiencies and increase risk. Learn how to integrate IT and HR systems to automate evidence collection, streamline reporting, and enforce consistent policies.
To Be Announced
Translating AI regulations into actionable enterprise controls is essential. This session provides practical strategies for risk categorization, documentation, and inspection readiness for AI systems.

CISO,
Regent AB

CISO, Danderyds sjukhus
Striking a balance between operational efficiency and regulatory compliance is critical. This session highlights prioritization frameworks, automation tools, and performance measurement to achieve both goals.
To Be Announced
Organizations operating internationally must manage overlapping regulations. This session discusses frameworks to map obligations, assess risk priorities, and coordinate cross-border compliance.

CISO, Alfa eCare Group
Mergers and acquisitions present unique compliance risks. Learn how to embed security and regulatory due diligence throughout the transaction lifecycle.

Kriminalkommisarie / Police Superintendent, Swedish National Police SC3
Hybrid work increases complexity in maintaining compliance. This session focuses on policies, monitoring, and cultural strategies for securing distributed teams without reducing agility.

Information Security Risk Specialist, Entercard Group AB
Leaders need measurable insights into organizational resilience. This session covers dashboards, automated alerting, and reporting frameworks for operational and compliance metrics.

CISO, Sokigo

CISO, Mentimeter AB
True compliance is cultural. This discussion explores leadership messaging, incentives, and integrating security and compliance principles into everyday workflows.

Information Security Strategist, Länsförsäkringar Bank

Head of information security,
Intel Law
Skilled cybersecurity professionals are in high demand. This session explores strategies for recruitment, career development, and retention to secure top talent in a competitive market.

Head of CSO Office | Deputy Head of Group Security & Cyber Defence, Chair of Women in Security, Swedbank

BISO,
Swedbank
Teams must be prepared for evolving threats, including AI-driven risks. Learn how to design training programs, simulations, and metrics for skill development.

Head of Center for Cybersecurity, RISE
Collaboration between sectors accelerates threat detection and response. Explore frameworks for intelligence sharing, coordinated response, and evaluating partnerships.

CISO, BITS DATA

Local IT Security Officer, Vattenfall
Incident response effectiveness relies on preparedness and coordination. This session highlights training, roles, and post-incident analysis to strengthen response capabilities.

Information Security Manager, IT Compliance, Avalanche Studios
Human limitations impact security operations. Learn strategies to monitor stress, implement support programs, and build resilience.
To Be Announced
International teams require consistent policies and flexible execution. This session covers coordination, communication, and tool centralization for global operations.

Cybersecurity Contextualist & Conceptualist, Bilfinger

CISO, Intrum
Engage teams with hands-on learning and gamification to improve skill retention.
To Be Announced
Effective collaboration depends on streamlined tools and processes. Explore strategies to reduce tool fatigue, enable real-time coordination, and enhance teamwork.

CISO,
Adda
Cybersecurity Expert, Cloud Security Alliance
Knowledge sharing strengthens resilience. Learn how to exchange actionable intelligence securely, standardize reporting, and maintain trust across organizations.

Cyber Security Project Manager, Rabobank

European Group Information Security Officer, KYOCERA Document Solutions Europe
Aligning security initiatives improves impact and efficiency. This session covers prioritization, coordination, and shared accountability across teams and sectors.