30 Roundtables. 30 Topics. 60 Moderators. 3 Critical Focus Areas. Fireside Chats.

THE 2026 INTELLIGENCE FRAMEWORK

The 2026 Intelligence Framework brings together the region’s most urgent security priorities into one coordinated agenda: 30 roundtables, 30 focused topics, and 60 expert moderators driving deep, practical discussion. Each session is designed to help leaders decode the real pressures shaping identity, cloud, AI governance, compliance, and resilience in the year ahead.

Across three critical focus areas, the rise of the non-human workforce, regulatory and operational balance, and collaboration under workforce strain – you’ll engage in fireside debates, tactical exchanges, and cross-sector insights that reveal the true pressure map for the Nordic region. This is where the intelligence behind 2026 takes shape.

Power Players
0 +
Executives
0 +
Top Tier Vendors
0 +
SEE ALL UNIQUE TOPICS

Round Table Discussion

CONTRIBUTORS

Insights from inspiring Keynotes and leading industry Experts.

Andrew Byrd

NATO Communications and Information Agency

David Jacoby

Chairman

Steffen Oxenvad

Acting head of unit Complex cybercrime, Polismyndigheten

Anders Enqvist

Head Of Security, Swedish Navy

Emmanuel Kessler

Head of team partnership & outreach, EUROPOL

Mattias Wiklund

Regional CIO, Toyota Northern Europe

Sushil Shenoy

IT Security Specialist, VizRT

Helene Neuss

Information Security Strategist, Länsförsäkringar Bank

Victor Pettersson

CISO, Sokigo

Staffan Fredriksson

CISO, Regent AB

Smeden Svahn

CISO, Adda

Marius Ebel

Cybersecurity Contextualist & Conceptualist, Bilfinger

Jan Olsson

CISO, Mentimeter AB

Surinder Lall

Head of Cyber Governance, Risk and Compliance at dmg media

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Magnus Carling

CISO, Stena AB

Jörgen Otosson

CISO, DPO at BITS DATA i Södertälje AB

Siegfried Moyo

Director, IT Security – (Deputy CISO) at Americold Logistics, LLC

Daniel Westbom

IT Risk & Security Manager, SEB

Henrik Tholsby

CISO, Danderyds sjukhus

Jakub Pasikowski

Information Security Manager, IT Compliance at Avalanche Studios

Anders Johansson

CISO, Alfa eCare Group

Elnaz Tadayon

Cybersecurity area manager, H&M

Bernard Helou

Cybersecurity Manager, Schibsted Media

Gamze Zengin

Head of information security, Intel Law

Johan Rosell

Head of Center for Cybersecurity, RISE

Sarbjit Singh

CISO, Mentimeter AB

Anudeep Konduri

Sr Security Specialist, Ericsson

Florin Chirilas

LITSO -Local IT Security Officer, Vattenfall AB

Anette Karlsson

CISO, Intrum

Payam Razifar

Information Security Specialist, Bravida

Christian Sahlén

Head of Security & Governance (CISO), TF Bank

Brett Hardman

CISO, Cabonline

Helana Malm

Head of CSO Office | Deputy Head of Group Security & Cyber Defence, Chair of Women in Security, Swedbank

Dzana Dzemidzic

BISO, Swedbank

Sümeyra Arda Çirpili

Cyber Security Project Manager, Rabobank

Burakhan Tahmaz

European Group Information Security Officer, KYOCERA Document Solutions Europe

Many More Power Players to Come

Ready to join the conversations shaping Nordic cybersecurity in 2026?

PART OF YOUR DELEGATE EXPERIENCE

All registered delegates gain access to all 30 roundtable discussions – each moderated by two
industry experts guiding executive-level dialogue.


This is the ONLY interactive, large-scale cybersecurity event in the Nordics, built entirely
around real conversations, real pressure points, and real leadership priorities.

Join us on 21 May 2026 in Stockholm – inside the only interactive, large-scale cybersecurity event in the Nordics.
Delve into our detailed agenda

Agenda

Please arrive early to secure your spot and ensure you don’t miss any important opening remarks.

Securing the New Non-Human Workforce: AI Agents and Machine Identities in Law Enforcement

Law enforcement agencies increasingly rely on AI-driven systems and machine identities—ranging from automated surveillance to digital case management tools. These “non-human actors” can outnumber human operators, raising new security, accountability, and governance challenges.

  • Managing the identity lifecycle of AI agents and automated systems while meeting national and EU data protection requirements (GDPR/Swedish regulations). 
  • Securing automated processes—such as predictive policing systems or automated reporting pipelines—against misuse, tampering, or insider threats. 
  • Embedding governance, auditability, and compliance into AI deployment from design to operations.

Defender of the Law: Andrew Byrd, CISO, NATO Communications and Information Agency (NCI Agency)

Green Room

12:10 Securing AI at Scale: Governance That Enables Innovation

Explore how leading enterprises implement secure, scalable AI pipelines without slowing adoption. Hear from in-house security leaders who balance governance with operational agility.

  • Best practices for AI agent oversight, runtime controls, and auditability.
  • Balancing security, compliance, and speed in enterprise AI deployments.
  • Lessons learned from scaling AI safely across multiple business units.
  • Preparing for upcoming regulatory guidance and identity management trends.

Blue Room

12:10 Beyond Checklists: Embedding Continuous Assurance in Operations

Gain insights on shifting from static compliance to measurable, operational resilience. Senior technical leaders share how automation and process integration drive real-world security outcomes.
  • Using automation to align with multiple regulatory frameworks without bottlenecks.
  • Transforming compliance from documentation into actionable, measurable practices.
  • Building frameworks that integrate IT, security, and risk for continuous assurance.
  • Real-world examples of resilience metrics and reporting across enterprise systems.

Balancing Compliance, Regulation, and Operational Efficiency in Public Security

Law enforcement and municipal IT departments must navigate strict regulatory frameworks without slowing mission-critical operations. This session explores strategies for ensuring compliance while maintaining agility.

  • Aligning IT, security, risk management, and HR to meet evolving legal and operational requirements in policing and municipal services. 
  • Transitioning from static, checklist-based compliance to continuous, automated assurance that scales across agencies. 
  • Avoiding bottlenecks in digital transformation and AI adoption while staying accountable to Swedish and EU regulations.

Awareness, Collaboration, and Workforce Limitations in Law Enforcement Cybersecurity

Talent shortages and fragmented inter-agency cooperation can limit cyber resilience. This session focuses on improving real-time awareness and leveraging cross-sector partnerships to strengthen defenses.

  • Enhancing inter-agency collaboration within Swedish municipalities and with national law enforcement authorities. 
  • Upskilling and cross-training teams to handle emerging threats, from ransomware to insider misuse of AI tools. 
  • Improving situational awareness with secure, coordinated incident response and intelligence sharing. 
  • Leveraging public-private partnerships for threat intelligence, workforce augmentation, and operational readiness.
By invitation only

Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!

Closing Innovator Keynote
Resilient Teams, Resilient Enterprise: Collaboration in Modern Security

Explore workforce innovation, inter-organizational coordination, and skills development for tackling emerging threats. Learn from in-house leaders who have successfully upskilled and mobilized cross-functional security teams.

  • Programs to upskill staff for AI-driven and automated threat landscapes.
  • Frameworks and tools for secure, cross-team, and inter-company collaboration.
  • Measuring workforce effectiveness and organizational resilience in real time.
  • Lessons from enterprises that have strengthened their security culture and operational readiness.

20th of May, 2025

Jelena Zelenović Matone

Ciso of the Year

99%

Satisfied Delegates

Join us as we navigate the future of cybersecurity together.

Andrew Byrd

NATO Communications and Information Agency

I’m a seasoned Cybersecurity and Operations Executive with a track record of leading complex technical initiatives that protect and enable mission-critical operations. With deep expertise in cyber defense, risk management, and information systems, I specialize in translating technical threats and solutions into strategic decisions that drive operational resilience for military and enterprise environments.

Throughout my career, I’ve built and led high-performing teams, shaped cybersecurity strategy across national and international defense landscapes, and guided executive leaders through evolving digital risk. I’m passionate about aligning cyber capabilities with organizational goals—whether through threat hunting, adversary emulation, or enterprise security modernization.

David Jacoby

Chairman

David Jacoby is one of Sweden’s most boldest hackers and IT security experts. He has over 25 years of experience in professional hacking and has won several awards both as a speaker and for his unique research and dedicated work to stop digital crime. In addition to his own research, he was one of the main hackers in HACKAD_ a Swedish TV show named “HACKAD_” where David and three colleagues have hacked Swedish companies live on the TV screen to show the complexity and necessity in issues such as IT security.

Anders Enqvist

Head Of Security, Swedish Navy

I have a total of 15 years of experience in the field of security, ranging from hands-on operational security roles to positions as a security officer, and currently as Head of Security at one of the largest government authorities. In my present role, approximately 99% of my work is dedicated to protective security.

I advocate an active and proactive approach to security management, where the focus—beyond compliance with laws, regulations, directives, policies, and procedures—is on close collaboration with the authority’s employees to ensure effective and integrated security practices.

Emmanuel Kessler

Chef d’équipe partenariat & sensibilisation - Head of team partnership & outreach at EUROPOL - EC3- CYBERCRIME CENTER

Emmanuel Kessler is a senior law-enforcement professional at Europol’s European Cybercrime Centre (EC3), where he serves as Head of Prevention & Outreach. Since joining Europol in 2020, he has led initiatives focused on cybercrime prevention, awareness-raising, stakeholder outreach, and public-private cooperation at the European and international levels. With over a decade of experience in international security and cybercrime cooperation, Emmanuel has worked extensively on EU affairs, strategic partnerships, and operational coordination. Prior to Europol, he held senior roles within the French Ministry of Interior, including Head of Staff at the National Cybercrime Unit (OCLCTIC) and Cyber Cooperation Officer in the Department of International Cooperation. His work bridges policy, operations, and engagement, supporting collective efforts to prevent cybercrime and strengthen resilience across the EU and beyond.

Mattias Wiklund

Regional CIO, Toyota Northern Europe

Business-centric IT-techie that strives for continuous improvement.

Passionate about improving business-processes and finding synergies within organisations.

Pragmatic in my approach and humble at heart.

Victor Pettersson

CISO, Sokigo

Victor Pettersson – Chief Information Security Officer focused on leading and developing structured security initiatives that deliver measurable results. Driven by a passion for continuous learning in a field that never stands still, I find every day in cybersecurity rewarding, each challenge brings new opportunities to learn something new.

Smeden Svahn

CISO, Adda

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Marius Ebel

Cybersecurity Contextualist & Conceptualist, Bilfinger

As a Cybersecurity Conceptualist and Contextualist, I specialize in reframing security so it enables and empowers people instead of restricting them. I focus on translating complex cybersecurity and privacy topics into practical, human-centered approaches that make sense in real-world contexts. Coming from an application development background, I understand firsthand how security gaps can scale across entire user bases and how important it is to design secure systems from the ground up. I’m passionate about privacy engineering, secure coding, and awareness that builds trust rather than fear.

Jan Olsson

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Fraud expert From the time at the police’s national fraud center with 30 years of experience in police work and 14 years dedicated to Fraud. Since autumn 2018, more against complex cybercrimes at the Swedish Cybercrime Center (SC3). Lectures nationally and internationally on everything from Social Engineering complexity to Monetary threats and societal consequences of laxity around Cybercrime and Fraud.

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Siegfried Moyo

Director, IT Security – (Deputy CISO), Americold Logistics, LLC

A seasoned cybersecurity transformational leader, strategist and researcher with over two decades of experience, I consistently drive significant cybersecurity improvements within an organization. My expertise lies in guiding businesses through strategic cyber and information security initiatives, enhancing their defences in the ever-evolving threat landscape. A key focus is always on stabilizing cybersecurity posture while ensuring business continuity. I believe in fostering strong cross-functional collaboration to achieve optimal cybersecurity outcomes.

My commitment to excellence is reflected in my book, ‘Executive’s Guide to Cyber Risk: Securing the Future Today,’ where I share actionable insights for business and board executives on navigating the complexities of cybersecurity.

I view cybersecurity as an integral enabler of business success, and I always strive to help organizations build cyber resilience that empowers their growth and innovation.

Mattias Wiklund

Regional CIO, Toyota Northern Europe

Moderator

As organizations increasingly deploy AI agents and autonomous systems, securing their identities throughout the lifecycle—from onboarding to decommissioning—has become critical. This session explores strategies for enforcing role-based access, automating credential management, and maintaining continuous policy compliance while enabling AI systems to operate efficiently.

  • Role-based access and automated credential lifecycle management.
  • Continuous monitoring for policy compliance.
  • Ensuring secure decommissioning of autonomous systems.
Surinder Lall

Head of Cyber Governance, Risk and Compliance, DMG Media

Moderator

Automated workflows and CI/CD pipelines often rely on high-value credentials and secrets that, if compromised, can lead to severe security incidents. This discussion covers practical approaches to securing keys, detecting anomalous activity, and enforcing least-privilege access without creating operational bottlenecks.

  • Detect and respond to anomalous credential usage.
  • Implement least-privilege access policies.
  • Secure CI/CD and AI automation pipelines without slowing innovation.
Sushil Shenoy

IT Security Specialist, VizRT

Moderator

AI-driven workflows can execute code autonomously, increasing operational efficiency but also introducing potential risks. This session focuses on containment strategies, sandboxing, real-time monitoring, and incident response planning to prevent rogue execution from causing disruption or damage.

  • Sandboxing and isolation strategies.
  • Real-time monitoring for unexpected behaviors.
  • Incident response protocols for AI-driven code execution.
Siegfried Moyo

Director, IT Security – (Deputy CISO), Americold Logistics, LLC

Moderator

As generative and predictive AI models are deployed across enterprises, understanding their provenance, training data, and deployment risks is essential. This session provides frameworks for model governance, data protection, and approval workflows to ensure responsible, auditable AI operations.

  • Track model provenance and lineage.
  • Prevent data leakage during training and inference.
  • Approval workflows for production deployment.
Moderator

To Be Announced

Moderator

Operating AI systems in live environments introduces dynamic risks. Learn how to define operational boundaries, integrate human oversight, and set up monitoring and alerting mechanisms that maintain both compliance and agility in high-stakes operations.

  • Define operational boundaries for autonomous agents.
  • Integrate human-in-the-loop review processes.
  • Alert and respond to compliance or behavioral deviations.
Moderator

To Be Announced

Moderator

AI agents often interact with sensitive data, making it vital to apply robust data protection strategies. This session explores encryption, tokenization, access governance, and audit trail practices to minimize exposure while enabling AI-driven decision-making.

  • Implement encryption, tokenization, and access controls.
  • Maintain comprehensive audit trails.
  • Reduce exposure through intelligent data governance policies.

Moderator

To Be Announced

Moderator

Autonomous systems can behave unpredictably, potentially creating self-propagating risks. This discussion covers behavioral anomaly detection, leveraging AI for threat intelligence, and implementing containment and rollback strategies to mitigate rogue AI actions.

  • Behavioral anomaly detection.
  • AI-assisted threat detection.
  • Containment and rollback strategies.
Elnaz Tadayon

Cybersecurity area manager, H&M

Moderator

Enterprises need to maintain security while avoiding lock-in with specific AI vendors. This session explores open standards, interoperability, and monitoring frameworks that ensure security and governance across multi-vendor AI environments.

  • Open standards and interoperable monitoring frameworks.
  • Cross-platform governance for multi-vendor environments.
  • Maintain security without sacrificing flexibility.
Bernard Helou

Cybersecurity Manager, Schibsted Media

Moderator

AI systems can occasionally act outside intended parameters, creating operational or security incidents. This session addresses detection, escalation, containment, and post-incident analysis to prepare teams for autonomous agent misbehavior.

  • Detection and escalation protocols.
  • Containment and mitigation strategies.
  • Post-incident analysis and lessons learned.

Payam Razifar

Information Security Specialist, Bravida

Moderator

Organizations must ensure AI operations comply with GDPR, the AI Act, and other regulations. This session explores embedding compliance controls into operational workflows, mapping regulatory requirements to AI systems, and preparing audit-ready evidence.

  • Map regulatory requirements to operational workflows.
  • Collect audit-ready evidence automatically.
  • Embed compliance controls into daily AI operations.
Daniel Westbom

IT Risk & Security Manager, SEB

Moderator

Christian Sahlén

Head of Security & Governance (CISO), TF Bank

Moderator

Compliance with multiple overlapping frameworks can be complex. This discussion covers aligning controls to business operations, avoiding duplication, and measuring effectiveness to achieve smooth regulatory alignment without sacrificing operational agility.

  • Map controls to business processes.
  • Eliminate duplicate efforts across frameworks.
  • Measure and track compliance effectiveness.
Moderator

To Be Announced

Moderator

Static audits are no longer enough. This session explores embedding continuous compliance and assurance into operations, enabling real-time monitoring, cross-team collaboration, and proactive gap resolution.

  • Automated evidence collection and dashboards.
  • Cross-team integration between IT, HR, and risk.
  • Rapid identification and resolution of compliance gaps.
Brett Hardman

CISO, Cabonline

Moderator

Manual compliance processes create inefficiencies and increase risk. Learn how to integrate IT and HR systems to automate evidence collection, streamline reporting, and enforce consistent policies.

  • Standardized data formats for reporting.
  • Integrations for real-time audit evidence.
  • Streamlined cross-functional reporting workflows.
Moderator

To Be Announced

Moderator

Translating AI regulations into actionable enterprise controls is essential. This session provides practical strategies for risk categorization, documentation, and inspection readiness for AI systems.

  • Categorize AI systems by risk level.
  • Implement transparency and documentation measures.
  • Prepare for regulatory inspections proactively.
Staffan Fredriksson

CISO,
Regent AB

Moderator

Henrik Tholsby

CISO, Danderyds sjukhus

Moderator

Striking a balance between operational efficiency and regulatory compliance is critical. This session highlights prioritization frameworks, automation tools, and performance measurement to achieve both goals.

  • Prioritize high-risk areas for oversight.
  • Delegate through automation to reduce bottlenecks.
  • Measure risk-adjusted operational performance.
Moderator

To Be Announced

Moderator

Organizations operating internationally must manage overlapping regulations. This session discusses frameworks to map obligations, assess risk priorities, and coordinate cross-border compliance.

  • Map local and global obligations.
  • Assess regional vs enterprise risk priorities.
  • Coordinate cross-border compliance initiatives.
Anders Johansson

CISO, Alfa eCare Group

Moderator

Mergers and acquisitions present unique compliance risks. Learn how to embed security and regulatory due diligence throughout the transaction lifecycle.

  • Pre-merger cybersecurity and privacy assessments.
  • Post-merger policy harmonization.
  • Address legacy systems and compliance gaps.
Jan Olsson

Kriminalkommisarie / Police Superintendent, Swedish National Police SC3

Moderator

Hybrid work increases complexity in maintaining compliance. This session focuses on policies, monitoring, and cultural strategies for securing distributed teams without reducing agility.

  • Endpoint and remote access controls.
  • Policy enforcement across multiple locations.
  • Promote a security and compliance-first culture.
Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Moderator

Leaders need measurable insights into organizational resilience. This session covers dashboards, automated alerting, and reporting frameworks for operational and compliance metrics.

  • Dashboards for key resilience indicators.
  • Automated alerts for control failures.
  • Documentation for leadership and regulators.
Victor Pettersson

CISO, Sokigo

Moderator

Sarbjit Singh

CISO, Mentimeter AB

Moderator

True compliance is cultural. This discussion explores leadership messaging, incentives, and integrating security and compliance principles into everyday workflows.

  • Leadership messaging and advocacy.
  • Incentivize proactive reporting.
  • Integrate compliance into everyday business processes.
Helene Neuss

Information Security Strategist, Länsförsäkringar Bank

Moderator

Gamze Zengin

Head of information security,
Intel Law

Moderator

Skilled cybersecurity professionals are in high demand. This session explores strategies for recruitment, career development, and retention to secure top talent in a competitive market.

  • Employer branding and recruitment strategies.
  • Career development pathways.
  • Retention programs for high-demand skills.
Helana Malm

Head of CSO Office | Deputy Head of Group Security & Cyber Defence, Chair of Women in Security, Swedbank

Moderator

Dzana Dzemidzic

BISO,
Swedbank

Moderator

Teams must be prepared for evolving threats, including AI-driven risks. Learn how to design training programs, simulations, and metrics for skill development.

  • AI security and automation-focused training.
  • Scenario-based simulations and exercises.
  • Skill tracking and competency measurement.
Johan Rosell

Head of Center for Cybersecurity, RISE

Moderator

Collaboration between sectors accelerates threat detection and response. Explore frameworks for intelligence sharing, coordinated response, and evaluating partnerships.

  • Share actionable intelligence securely.
  • Establish coordinated response frameworks.
  • Measure partnership effectiveness.
Jörgen Ottosson

CISO, BITS DATA

Moderator

Florin Chirilas

Local IT Security Officer, Vattenfall

Moderator

Incident response effectiveness relies on preparedness and coordination. This session highlights training, roles, and post-incident analysis to strengthen response capabilities.

  • Cross-functional training programs.
  • Clear escalation paths and role definitions.
  • Post-incident analysis and continuous improvement.
Jakub Pasikowski

Information Security Manager, IT Compliance, Avalanche Studios

Moderator

Human limitations impact security operations. Learn strategies to monitor stress, implement support programs, and build resilience.

  • Monitor workload and stress indicators.
  • Implement well-being and counseling programs.
  • Build resilience into operations.
Moderator

To Be Announced

Moderator

International teams require consistent policies and flexible execution. This session covers coordination, communication, and tool centralization for global operations.

  • Align policies globally while empowering local execution.
  • Define communication protocols across time zones.
  • Centralized tools with flexible deployment.
Marius Ebel

Cybersecurity Contextualist & Conceptualist, Bilfinger

Moderator

Anette Karlsson

CISO, Intrum

Moderator

Engage teams with hands-on learning and gamification to improve skill retention.

  • Simulation-based exercises and scenarios.
  • Incentives, leaderboards, and measurable engagement.
  • Track knowledge retention and skill improvement.
Moderator

To Be Announced

Moderator

Effective collaboration depends on streamlined tools and processes. Explore strategies to reduce tool fatigue, enable real-time coordination, and enhance teamwork.

  • Evaluate ticketing, SIEM, and collaboration platforms.
  • Avoid tool fatigue and duplication.
  • Enable real-time coordination and alerting.
Smeden Svahn

CISO,
Adda

Moderator

Niclas Kjellin

Cybersecurity Expert, Cloud Security Alliance

Moderator

Knowledge sharing strengthens resilience. Learn how to exchange actionable intelligence securely, standardize reporting, and maintain trust across organizations.

  • Threat intelligence and mitigation strategies.
  • Standardized reporting formats for partners.
  • Ensure confidentiality and trust frameworks.
Sümeyra Arda Çirpili

Cyber Security Project Manager, Rabobank

Moderator

Burakhan Tahmaz

European Group Information Security Officer, KYOCERA Document Solutions Europe

Moderator

Aligning security initiatives improves impact and efficiency. This session covers prioritization, coordination, and shared accountability across teams and sectors.

  • Coordinate timelines and goals across teams.
  • Identify overlapping initiatives and redundancies.
  • Establish shared accountability structures.
SEE ALL UNIQUE TOPICS

Round Table Discussion