Email Support

tickets@granditsecurity.com

Days
Hours
Minutes
Seconds

Book Your Free Ticket

 

About Bugcrowd

At Bugcrowd, we don’t compromise. We are relentlessly focused on enabling businesses to innovate and do everything proactively possible to secure their organization, reputation, and customers against cyber attacks.

 

For more information about Bugcrowd, please visit bugcrowd.com

Secure your spot

The ultimate cybersecurity conference

From October 1st

€89

Per ticket

From March 1st

€189

Per ticket

From April 1st

$489

Per ticket

Speaker: Giovanni Söderman

Vice President Global IT, Consilium Safety Group

As the Cyber Resilience Act (CRA) mandates organisations to bolster their cybersecurity frameworks, many are grappling with significant budget and resource constraints. The challenges of aligning with CRA requirements while operating under financial and personnel limitations needs to be discussed. Practical strategies need to take place for prioritising cybersecurity investments, optimising existing resources, and advocating for increased funding in an era where cyber threats are escalating.

  • Balancing Compliance and Budget: Exploring cost-effective measures and prioritisation strategies to meet CRA requirements without overextending limited budgets.
  • Resource Optimization: Identifying and leveraging existing tools, technologies, and human resources to maximise cybersecurity resilience despite staffing or technological shortages.
  • Advocating for Cybersecurity Funding: Tactics for building a compelling case to stakeholders and leadership for increased investment in cybersecurity, focusing on the long-term risks of underfunding.

Speaker: Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Speaker: Peter Lundell

Public Sector Account Manager, Elastic

The digital landscape is evolving rapidly, and with it, the nature of cyber threats is becoming more sophisticated. As Artificial Intelligence (AI) continues to transform industries, it is also being harnessed by malicious actors to conduct more effective, intelligent, and automated cyber-attacks. These AI-powered attacks pose a significant challenge to organisations, as traditional security measures are often insufficient to detect and mitigate these advanced threats.We will delve into the growing trend of AI-driven cyber threats, explore the tactics used by attackers, and discuss how businesses can adopt AI-enhanced cybersecurity solutions to stay ahead of the curve.

  • Understanding the AI Threat Landscape
  • Why Traditional Cybersecurity Falls Short?
  • Leveraging AI for Cyber Defense

Speaker: Martin Karlsson

 CISO, AP3

Speaker: Dirk-Jan van Helmond

 Director, Solutions Engineering, Cloudflare

As we stand on the cusp of a new technological era, businesses must navigate a landscape that is constantly evolving. Emerging technologies like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are not just buzzwords; they are powerful tools that can drive innovation, streamline operations, and create new opportunities for growth. We will explore how companies can strategically leverage these technologies to stay competitive and foster sustainable growth. By understanding the impact and potential of these advancements, businesses can not only keep pace with change but also lead it.

  • Unlocking the Power of AI and Machine Learning: How AI can transform business operations through automation, predictive analytics, and personalised customer experiences? 
  • Case studies of companies successfully implementing emerging technologies such as AI, Blockchain and IoT to improve decision-making and reduce costs.
  • Best practices for integrating emerging tech into existing business models to drive innovation and efficiency.

Speaker: Smeden Svahn

CISO, Adda

As the Nordics experience a surge in phishing attacks targeting businesses and consumers, we must play a proactive role in safeguarding digital ecosystems. Cybercriminals are using increasingly sophisticated methods to exploit vulnerabilities, making it imperative for service providers, software vendors, and cybersecurity firms to enhance their defence strategies. 

  • Evolving Phishing Tactics in the Nordics
  • Impact on Critical Sectors
  • Countermeasures and Best Practices 

Speaker: Lydia Meneses

 (CISA) | SOC Manager,OKQ8

Speaker: Stephen McDermid

Regional CSO, EMEA, OKTA

In today’s interconnected and globalised world, the security of supply chains has become more critical than ever. Disruptions, ranging from cyberattacks to geopolitical tensions, have highlighted the vulnerabilities that can cripple businesses. We will explore the importance of supply chain resilience, focusing on how companies can fortify their end-to-end processes. By implementing advanced security measures, developing flexible risk management strategies, and leveraging technology, organisations can create robust and adaptive supply chains that withstand challenges and drive sustained growth.

  • Integrating Cybersecurity in the Supply Chain
  • Building Flexible and Agile Risk Management
  • Collaborating with Partners for Holistic Security

Speaker: Jan Öhman

Information Security Evangelist (Former CISO of Elisa Polystar)

Speaker: James Johnson

Regional Sales Director, Northern Europe & Middle East, Bitdefender
  • Why automate? Understanding the effects of good (and bad) automation in IT Security
  • Closing the skills gap leveraging technology
  • Continuously identifying & reducing the attack surface

Speaker: Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Speaker: Georgios Kryparos

CISO, Einride

In a world where cyber threats are evolving at an unprecedented pace, the traditional perimeter-based security models are no longer sufficient. Zero-Trust Architecture (ZTA) offers a transformative approach to modern security, shifting the focus from trusted networks to continuous verification of every user, device, and connection. How Zero-Trust is redefining the digital landscape, ensuring that security is embedded in every layer of access control, data exchange, and operational integrity? It’s a call for organisations to adopt a proactive defence mechanism in an increasingly borderless digital environment.

  • Trust no one, verify everything: The shift from perimeter security. How does ZTA enforces the principle of “never trust, always verify,” ensuring each access request is authenticated and authorised regardless of location?
  • How does Zero-Trust dynamically adapt to changing threat landscapes by constantly validating credentials and access points?
  • Step-by-step guidance on implementing Zero-Trust across network infrastructure, including identity verification, least privilege access, and micro-segmentation.

Speaker:  Kouadio Simon N'zué

 Aircraft System Engineering, Airbus

As the global adoption of 5G technology accelerates, it promises faster speeds, reduced latency, and increased connectivity across industries. However, with these advancements come new cybersecurity challenges. The vulnerabilities inherent in 5G networks and discuss strategies for safeguarding the future of connectivity. By addressing these risks, we can ensure the secure deployment and operation of 5G, which is critical for supporting next-generation applications like autonomous vehicles, IoT, and smart cities.

  • How 5G’s use of virtualization and network slicing opens new avenues for cyber threats?  
  • What are the risks associated with compromised software, hardware backdoors, and potential state-sponsored espionage?
  • Mitigating Risks in IoT and Critical Infrastructure.

Speaker: Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

Speaker: Steven Duckaert

EMEA pre-sales team, Upwind

Are you tired of dealing with misconfigurations in cloud infrastructure? Introducing the Innovator session!

Gain unparalleled insights from industry leaders who have revolutionised cloud security. Discover cutting-edge strategies and innovative solutions that will empower you to tackle challenges head-on.

Join the session and take control of your cloud security journey. Together, we can build a safer digital landscape.

Speaker: Jan Olsson

Police Superintendent ~ Årets Säkerhetsprofil 2022, Polismyndigheten Swedish Cybercrime Center SC3

Speaker: Christian Reinhardt

Director Human Risk Management, SoSafe

In our increasingly connected world, cybersecurity is more important than ever. But too often, organisations and individuals become complacent after initial safeguards are in place. Cyber threats are constantly evolving, and so should our awareness and responses. We will dive into why cyber awareness must be an ongoing effort, not a one-time action, and how continuous vigilance can protect us from unseen dangers in the digital realm.

  • “The Cyber Threat Never Sleeps”: Understand how cybercriminals continuously develop new tactics and why static defences won’t suffice.
  • “Human Error: The #1 Cyber Vulnerability”: Learn why ongoing training and awareness are key to minimising the most common cybersecurity weakness—us.
  • “Stay One Step Ahead”: Explore the latest trends in cybersecurity to understand why proactive measures and up-to-date security strategies are the foundation of long-term protection.

Speaker: Christian Hedström

CISO, QD Sverige

Speaker: Thom Langford

EMEA CTO, Rapid7

Cybersecurity is no longer just an IT issue—it’s a business imperative. However, a gap often exists between the technical insights of CISOs and the strategic priorities of the management board. We will explore how organisations can build stronger bridges of communication and collaboration between these two crucial groups. By fostering mutual understanding, businesses can not only enhance their cyber resilience but also turn cybersecurity into a competitive advantage.

  • Speak the Same Language: Translating Tech to Business Impact
  • Cybersecurity as a Strategic Asset: Making Cyber a Boardroom Priority
  • Bridging the Cultural Divide: Building Trust Between CISOs and Executives

Speaker: Anders Jared

CISO, Bravida

Speaker: Gareth O'Sullivan

 Lead Trust & Security Engineer for EMEA, Bugcrowd

As the EU prepares to enforce its groundbreaking AI regulations, industries across the globe are left grappling with what compliance means in practice. The new EU AI Act sets ambitious standards for AI systems, aiming to balance innovation with ethical oversight.Let’s dive into the implications of these regulations, exploring how businesses can adapt, what loopholes still exist, and whether this new legal framework will truly tame the AI revolution or leave it in chaos.

  • What are the key compliance challenges, and how can organisations ensure they align with these new rules while fostering innovation?
  • Will the AI Act stifle creativity, or does it create new opportunities for ethical AI development?
  • How will this regulation impact global AI development and adoption, and what does it mean for non-EU companies looking to do business in Europe?

Speaker: Nithin Krishna

Head of Cyber Security, Jeppesen

Speaker: Santhosh Jayaprakash

 Founder & CEO, Unosecur

While the advantages and drawbacks of Zero Trust solutions have been widely debated, the greatest challenge lies in shifting the mindset of users. Educating individuals on adopting the Zero Trust approach is far more crucial than merely deploying the technology itself. The success of Zero Trust strategies hinges on effectively translating the concept into tangible business value.

  • The Future of Zero Trust with Advanced Technologies and AI: As technology evolves, particularly with advancements in artificial intelligence, the Zero Trust framework will continue to evolve. AI will play a pivotal role in enhancing security through dynamic, real-time verification processes, automating threat detection, and responding to potential risks in a smarter, more adaptive manner.
  • What Does “Always Verify, Never Trust” Mean? At the core of Zero Trust is the principle that no entity, whether inside or outside the network, should ever be trusted by default. Every access attempt must be continuously verified. This proactive stance ensures that the network remains secure, requiring constant authentication and validation of users, devices, and data before granting access.
  • Zero Trust in the Cybersecurity Landscape: In cybersecurity, the Zero Trust model marks a paradigm shift from traditional perimeter-based defences. Instead of assuming that entities within the network are safe, Zero Trust operates under the assumption that threats can exist both inside and outside. This approach minimises risk by enforcing strict access controls, continuous monitoring, and verification at every step, ensuring a more resilient and secure environment.

Speaker: Lars Ponten

Cybersecurity Evangelist

Speaker: Sharon Larsson

 CISO, Svenska Spel

In the age of artificial intelligence, businesses and individuals are more connected—and more vulnerable—than ever before. While AI offers groundbreaking innovations, it also opens the door to new cyber threats. As technology evolves, so must our cybersecurity practices. How good cyber hygiene and compliance protocols are essential for safeguarding sensitive data, maintaining trust, and staying ahead of evolving threats? Join us to discover how combining traditional cybersecurity measures with AI-driven solutions can create an unbreakable digital fortress.

  • “Smart Defences for Smart Attacks”: Learn how AI is transforming both sides of the cybersecurity landscape—making attackers more sophisticated and defences more dynamic. Understand the importance of proactive cyber hygiene practices to stay one step ahead of AI-powered threats.
  • “Compliance in the Age of Automation”: Explore the evolving regulatory landscape, from GDPR to CCPA, and how businesses must adapt compliance measures to meet the challenges of automated data processing and AI integration.
  • “AI + Human Vigilance = A Clean, Safe Digital Space”: Discover why AI alone is not a silver bullet and how fostering a culture of cyber hygiene—where human vigilance complements AI-driven defences—is key to long-term cybersecurity success.

Speaker: Prof. Shahid Raza

Professor of Cybersecurity, University of Glasgow, UK

As we race into the 2025 and beyond, the next generation of communication, 6G, promises to natively integrate terrestrial networks with non-terrestrial networks, namely satellite, drones, planes, in addition to promising revolutionary advancements in speed and connectivity. However, this rapid evolution can bring a new set of vulnerabilities that could jeopardise our digital infrastructure. Join us as we dive into the emerging risks and strategies to safeguard our hyper-connected future. Explore the novel attack vectors and security challenges unique to 6G technology.

  • Explore the novel attack vectors and security challenges unique to 6G technology.
  • Analyse case studies and potential consequences of 5G network breaches on businesses and everyday life. 
  • Learn about cutting-edge security measures and proactive strategies being developed to protect the 6G ecosystem from future threats.

Speaker: Sanjay Kumar

PhD, Cybersecurity | Threat Intelligence Manager, Landis+Gyr

Speaker: Rolf Lindby

CIO, Bulls Press

In this riveting session, we dive into the high-stakes world of ransomware attacks that have rocked Europe. From multi-million-dollar ransom demands to critical infrastructure disruptions, this case study sheds light on how various European countries have been fighting back against these relentless cyber threats. Discover the strategies, lessons learned, and innovative solutions that are shaping Europe’s cybersecurity landscape.

  • The Ransomware Rising: A European overview
  • Strengthening the frontlines: Europe’s defence strategies
  • Lessons from the Battlefield: Building a resilient future.

Speaker: Daniela Almeida Lourenço

Global CISO, Hunkemöller

Teresia Willstedt

ISO, MedMera Bank

Phishing simulations are crucial for maintaining a security edge. Currently, phishing your own users is just as vital as implementing cutting-edge cybersecurity solutions. Without training your team to remain vigilant, how can you ensure protection against phishing attacks?

  • The increase of phishing attacks due to advanced technologies. 
  • Strategies for conducting sophisticated awareness programs for users. 
  • Methods for staying ahead of emerging threats.

Speaker: Trish McGil

Chief Cyber Security Strategist | Executive Subject Matter Expert Cyber Security, De Heus Voeders

In an era where cyber threats are evolving at an unprecedented rate, it’s crucial to stay ahead of the curve. Join us as we delve into the latest innovations in cybersecurity that are set to revolutionise the way we protect our digital realms. From AI-driven threat detection to quantum encryption, this will showcase how emerging technologies are shaping the future of cyber defence.

  • AI Revolution: Explore how artificial intelligence is revolutionising industries from healthcare to entertainment, and what ethical considerations come with its rapid advancement.
  • Quantum Leap: Get a glimpse into the world of quantum computing, where the limits of classical computing are challenged, and see how this technology might solve complex problems faster than ever before.
  • Sustainable Tech: Discover the latest in green technologies and sustainable practices, and learn how emerging innovations are working towards a more eco-friendly and energy-efficient future.

Speaker: Anders Thingholm

 Head of Information Security, DANX Carousel

With NIS2 enforcement reshaping expectations across sectors, Business Continuity Planning has become a strategic imperative. But what does real-world BCP implementation look like? This roundtable explores how organizations can move from static documents to dynamic resilience strategies that work under pressure.

  • Why BCP is a core pillar of NIS2—and how to approach it differently from traditional crisis management
  • Practical steps for designing, implementing, and testing a living BCP framework
  • Turning continuity planning into business value: reducing downtime, increasing stakeholder trust, and supporting faster recovery
  • Peer insights: what’s working, what’s not, and where to begin if you’re starting from scratch

Speaker:  Adnan Jamil

CTO, Frank Penny

Organisations across various industries have embraced cloud computing to simplify their operations and enjoy its technological benefits. However, this transition is not without its challenges. In fact, it introduces significant concerns, as companies struggle to safeguard their cloud environments from prevalent security threats. Issues such as limited visibility and control over cloud infrastructure, unauthorised access, and external data sharing pose ongoing difficulties.

  • Cloud Security Threats: 2025 and Beyond
  • Regulatory Compliance: Is It Beneficial for Cloud Security?
  • Strategies for Protecting Your Cloud Environment

Speaker: Adnan Jamil

CTO, Frank Penny

Speaker: Hugo Sigurdson

Security Engineer, CrowdStrike

As artificial intelligence continues to evolve and integrate into various sectors, its potential to revolutionise cybersecurity is accompanied by new and unprecedented threats. We will explore the dark side of AI, revealing how malicious actors are harnessing its power to orchestrate sophisticated cyber attacks. Attendees will gain insights into the emerging trends in AI-driven cyber threats, understand the vulnerabilities that are being exploited, and learn proactive strategies to defend against this high-tech menace.

  • The Rise of AI-Powered Cyber Weapons: Uncover how AI is being used to automate and enhance cyber attacks, from deepfakes to autonomous hacking tools.
  • Identifying Vulnerabilities in the Age of AI: Learn about the new security challenges posed by AI and how traditional defences are being outpaced by smart, adaptive threats.
  • Strategies for Resilience and Defense: Discover cutting-edge techniques and best practices for leveraging AI in your own cybersecurity efforts to stay one step ahead of the attackers.

Speaker: Per Gustavsson

CISO, Stratsys

Speaker: Thomas Norlin

Senior Enterprise Sales Executive, Akamai

Zero Trust is a forward-thinking cybersecurity approach that abandons the outdated perimeter-based security mindset. It assumes that no user or device—inside or outside an organization’s network—should be trusted by default. As remote work, cloud adoption, and advanced cyber threats become the norm, Zero Trust delivers a resilient strategy for reducing risk, managing access, and validating identity at every step. Its guiding principle is simple: trust nothing, verify everything.

  • Continuous verification: Every access request is fully authenticated, authorized, and encrypted, regardless of origin or location.
  • Least privilege access: Limit access strictly to what users and devices need, minimizing potential damage from compromised accounts or systems.
  • Assume breach mentality: Zero Trust operates under the assumption that breaches will occur, focusing on containment, visibility, and rapid response rather than only prevention. 

Speaker: Dr. Tim Nedyalkov

 Former TISO, Commonwealth Bank of Australia

Quantum computing is no longer science fiction—it’s fast becoming a revolutionary technology with the potential to reshape industries, crack previously unsolvable problems, and drive innovation. But with great power comes great responsibility. While quantum computers promise breakthroughs in fields like medicine, finance, and artificial intelligence, they also pose existential risks to cybersecurity and could widen the digital divide. In this session, we will explore the promise and peril of quantum computing, and whether it will lead us to a brighter future or usher in unforeseen challenges. Is it the blessing we’ve been waiting for, or could it become a curse in disguise?

  • The quantum leap: Breakthroughs and opportunities

 Quantum computing’s immense power can revolutionise sectors such as drug discovery, climate modelling, and artificial intelligence by solving complex problems that today’s supercomputers struggle with.

  • Security: Savior or Saboteur? 

While quantum computers could improve cryptography and enhance security systems, they also threaten to break the encryption methods that protect global financial systems, military secrets, and personal data.

  • Widening the Tech Gap: Who Wins, Who Loses? 

As quantum technology matures, the digital divide between countries and corporations may widen. Those who can harness its power will gain immense advantages, leaving others behind and potentially reshaping the geopolitical landscape.

Speaker: Björn Johren

CISO, Max Matthiessen AB

Ransomware attacks have rapidly evolved into one of the most severe and pervasive cybersecurity threats, targeting businesses, governments, and individuals alike. The sophistication of these attacks has escalated, often resulting in catastrophic financial and operational impacts. The current state of ransomware, exploring recent high-profile cases, emerging trends, and the critical strategies needed to defend against this growing menace and business processes. How can this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture?

  • The Rise of Double and Triple Extortion Tactics
  • The Role of Ransomware-as-a-Service (RaaS)
  • Strategies for Building Resilience and Response

Speaker: Martin Vallee

CISO,CSO & Head od DevOps, Eyeonid

Speaker: Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

As more organisations migrate to cloud-based environments, they find themselves facing a new set of cybersecurity challenges. While the cloud promises scalability, flexibility, and cost savings, it also brings its own stormy skies. The biggest cybersecurity challenges cloud users face today: Cloud Compliance, Lack of Skills, Identity and Access Management (IAM), and Shadow IT. Join our experts as they discuss these pressing issues and provide actionable insights on how to secure your cloud journey and weather any cybersecurity storm that comes your way.

  • Cloud Compliance
  • Lack of Skills
  • Identity and Access Management (IAM)
  • Shadow IT

Speaker: Thomas Warneryd

CISO, Scandi Standard

Speaker: Richard Rosengren

Territory Sales Manager, Thales

A major challenge many businesses face in cloud environments is the limited control and visibility over their systems and data. It’s essential to maintain full oversight of your cloud infrastructure to ensure data security and smooth operations. Without proper control and visibility, your organisation becomes vulnerable to data breaches, leaks, or even encryption attacks. 

Thankfully, there are security solutions available to help mitigate these risks.

Speaker: Shahmeer Amir

Ethical Hacker

As we transition into the 5G era, the enhanced speed and widespread availability bring unprecedented opportunities but also broaden the attack surface for cyber threats. However, solutions are available to secure and monitor 5G network traffic, safeguarding against unauthorised access and data breaches.

Speaker: Johan Nordin

 Director of IT & IS, Extenda Retail

Join our exclusive session on Supply Chain Attacks, tailored for professionals looking to deepen their knowledge of software supply chain vulnerabilities. Explore the complexities of these threats and learn strategies to protect your organisation from the risks posed by malicious actors. Gain valuable insights into identifying weaknesses within your supply chain and strengthening your defences to prevent breaches that could endanger critical systems and sensitive data. Don’t miss this opportunity to enhance your expertise and secure your digital assets.

Speaker: Rolf Lindby

CIO, Bulls Press

Are you ready for the next wave of ransomware attacks? Join us for an eye-opening session that uncovers the dark progression of triple extortion. Imagine this: hackers breach a system, unleashing ransomware, but they don’t stop there. Before encrypting the data and locking out the victim, they steal sensitive information. Then, they push the extortion further by threatening the victim’s business partners and associates with a data leak, aiming to extract even more money. In this session, you’ll gain the tools and insights to defend your organisation against this escalating threat and protect your critical data from malicious attacks.

Speaker: Thomas Evertsson

Head of IT, Swedish Film Institute

Speaker: Akhilesh Mandowara

Executive consultant, EMEA Practice Leader – Cloud &            Infrastructure Security, IBM Cybersecurity Services

Speaker: Johnny Krogsboll

Technical Security Leader, Palo Alto Networks Sweden

As artificial intelligence transforms industries and powers innovation, it also opens the door to unforeseen threats. The same algorithms that drive progress can be weaponized for malicious purposes, making it essential for businesses and individuals to understand and address the risks. This presentation will highlight the growing dangers of AI-related threats, from data manipulation to deep fakes, and explore how to stay ahead of these evolving challenges.

  • Deep fake Deception
  • AI-Driven Cyber Attacks
  • Ethical AI Dilemmas

Speaker: Teresia Willstedt

ISO, MedMera Bank

In today’s digital landscape, phishing attacks are more common than ever, often disguised as legitimate communications. This presentation will unravel the mysteries behind these deceptive schemes, helping you spot the fakes and protect your valuable information. Join us for a deep dive into the world of phishing and learn how to defend yourself from these cunning cyber threats.

  • Spotting the Hook
  • Reeling in the Scammers
  • Safety Net Strategies

Speaker: Naz Bozdemir

 Product Marketing Lead, HackerOne

Speaker: Smeden Svahn

 CISO, Adda

Is cybersecurity a cost center or a profit protector? For too long, security leaders have struggled to justify their budgets in terms boards and business leaders can understand. It’s time to shift the conversation. This session introduces Return on Mitigation (RoM), a framework designed to quantify the financial impact of mitigated breaches, enabling leaders to position cybersecurity as a critical investment that enables business priorities.

In this session, you'll discover how to:

  • Use the RoM calculator, built on widely accepted industry benchmarks like IBM’s Cost of a Data Breach Report
  • Automate RoM calculations and generate real-time summaries tailored to your organization’s business and risk profile.
  • Make data-driven business cases to your board and executive team, showing why offensive security programs are essential to operational continuity, brand protection, and long-term profitability.

Speaker: Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Speaker: Marcin Zimny

Senior Principal Solution Architect, Ping Identity

Digital landscape, traditional security models are no longer sufficient to protect against sophisticated cyber threats. Enter Zero-Trust Security—a groundbreaking approach that operates on the principle of never trusting, always verifying. This presentation will explore how Zero-Trust can revolutionise your security strategy, providing a robust framework that anticipates and mitigates threats before they can compromise your systems.

  • Uncompromising Security
  • Enhanced Risk Management
  • Seamless Integration

Speaker: Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Speaker: Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

This presentation will explore how emerging technologies are reshaping the security landscape, presenting both new opportunities and challenges. We’ll delve into the latest advancements, from AI-driven security measures to quantum encryption, and discuss their implications for safeguarding digital assets. Discover how these innovations are revolutionising the way we protect our information and what steps you can take to stay ahead of cyber threats.

  • AI and Machine Learning in Cyber Defense
  • Quantum Encryption: The Future of Secure Communication
  • The rise of decentralised security

Speaker: Dag Friden

Chief Information Security Officer, Aros Kapital

Speaker: Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec
  • Evolving Threats: Cyber threats are constantly changing. Staying updated on the latest risks ensures your defences remain effective and your data stays protected.
  • Ongoing Education: Regular training keeps your team informed about best practices, empowering them to recognize and respond to potential threats swiftly.
  • Adaptive Strategies: Continuous awareness helps in refining security policies and practices, ensuring they adapt to new vulnerabilities and attack vectors.

Speaker: Anupama Jaiswal

Information Security Specialist, Truecaller
  • Understanding the Threat Landscape: Learn about the increasing risks associated with third-party vendors and partners, including data breaches and cyber-attacks, and how they can impact your organisation.
  • Effective Risk Management Strategies: Discover actionable strategies to assess and mitigate third-party risks, from due diligence to continuous monitoring, ensuring your cybersecurity measures extend beyond your direct control.
  • Building Resilient Partnerships: Gain insights on fostering secure and trustworthy relationships with third parties, including best practices for contracts, compliance, and regular audits to fortify your overall cybersecurity posture.

Speaker:  Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller
  • Unseen Risks: Learn how insider threats can quietly compromise your data and systems from within, often without detection until it’s too late.
  • Detection and Prevention: Explore cutting-edge techniques and tools designed to identify suspicious behaviour early and prevent potential breaches.
  • Real-World Case Studies: Discover lessons from recent insider threat incidents and how businesses like yours can bolster defences against these internal risks.

Speaker: Thea Sogenbits

CISO, Estonian Tax and Customs Board
  • Targeted Precision: Explore how state-sponsored attacks are strategically designed to exploit specific vulnerabilities in national infrastructure, corporate systems, and critical technologies. 
  • Advanced Techniques: Discover the cutting-edge methods employed by nation-states to conduct cyber espionage, from sophisticated malware to zero-day exploits.
  • Global Implications: Understand the far-reaching consequences of state-sponsored cyberattacks, including geopolitical tensions, economic impact, and the need for international

Speaker: Roger Olmås

CISO, Rusta
  • Phishing Phantoms: Learn how attackers use deceptive emails and websites to steal your confidential information. Spot the red flags before they hook you! 
  • Pretexting Perils: Discover how cybercriminals craft convincing stories to manipulate you into revealing personal details or giving away access. Stay one step ahead with our insider tips!
  • Baiting Blunders: Understand the tactics behind fake offers or tempting downloads designed to lure you into compromising your security. Guard against these traps with our expert advice!

Speaker: Elnaz Tadayon

Cybersecurity Manager,  H&M

Speaker: Bala Periasamy

Nordic Product Industry Security Lead, Accenture

In today’s interconnected economy, technology-driven supply chains enable the seamless flow of goods across borders. However, this reliance on digital systems also exposes these global networks to significant risks from cybercriminals and other malicious actors. To safeguard uninterrupted operations, implementing comprehensive, end-to-end security measures is no longer optional but essential. 

  • Cyber Vulnerabilities: Increasing dependence on technology makes supply chains prime targets for cyberattacks, threatening disruptions in critical sectors. 
  • Need for Comprehensive Security: Robust, multi-layered defences are crucial to detect, prevent, and respond to potential cyber threats throughout the supply chain. 
  • Impact on Global Economies: Disruptions in supply chains due to cyber incidents can have ripple effects, impacting global trade and economic stability. 

Speaker: Peter Hampus

CIO, Nackademin

Speaker: Jaens Stafren

Account Executive EMEA, Keeper

The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution. Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you. 

  • What are the challenges in adjusting your PAM strategy as you grow 
  • Keeping up with compliance requirements 
  • How to choose a PAM solution that grows with you

Speaker: Russ Bentley

Executive Vice President Product Marketing, Zerofox

Learn how attackers exploit the digital footprint of business leaders and what can be done to mitigate these risks. 

Synopsis: Europe's cyber threats have intensified in 2024, with sophisticated attacks targeting executives to breach enterprise networks. Social engineering, ransomware, and access broker markets pose significant dangers. 

We will explore how to identify exposed information, understand potential exploitation methods, and implement effective mitigations. With limited resources and active dark web threats, organizations need strategic threat intelligence to defend against malicious actors in this rapidly evolving landscape. 

  • Learn how to proactively identify your exposed information before attackers find it 
  • Understand how cybercriminals leverage compromised information against executives and organizations 
  • Discover practical mitigation strategies for the evolving European cyber threat landscape
  • Gain strategic approaches to threat intelligence that maximize limited security resources
  • Get insights into dark web actor methodologies, including social engineering tactics, ransomware operations, and initial access broker marketplaces 

Speaker: Boaz Barzel

Field CTO, OX Security

Speaker: Predrag Gaic

 Chief Information Security Officer, Viedoc

Security leaders are expected to do it all—but where should CISOs really focus when it comes to Application Security? Join us for a high-impact session where we cut through the noise and break down what truly matters in AppSec. Discover strategic insights, actionable frameworks, and real-world approaches to making AppSec manageable—without the overwhelm.

  • Clarify your role in AppSec to drive real security outcomes
  • Overcome common roadblocks and avoid wasted efforts
  • Learn from industry experts on how to balance security, speed, and innovation

Speaker: Stefan Lager

 CTO Services, Sciber

Speaker: Sayantan Dey

Compliance Officer/ Risk Management Expert, Sandvik

As cyber threats grow increasingly sophisticated and stealthy, MDR has emerged as a preferred solution for organizations seeking 24x7 threat detection and incident response. However, not all MDR services are created equal; some fail to provide real, actionable outcomes and improvement.

 

This roundtable will explore the reality behind MDR offerings, what’s working, what’s marketing fluff, and how organizations can cut through the noise to find actual value. We’ll also explore how to evaluate MDR effectiveness, what is required from the customer, and what metrics matter when measuring success.

 

With real-world insights, peer experiences, and challenging questions on the table, this session will help you rethink how MDR fits into your broader security strategy.

 

  • What does “effective MDR” actually look like in practice?
  • How can you tell if your MDR provider is truly improving your security posture?
  • What questions should you ask before choosing or renewing an MDR contract?
  • What role does the customer play in ensuring MDR success — and what does effective collaboration look like?

Speaker: Jared Henderson

Founder, Falx Cyber Security (Teleport)

Speaker: Vivek Rao

Information Security Risk Specialist, Entercard Group AB

The Digital Operational Resilience Act (DORA) came into full effect on January 17, 2025, ushering in a new era of stringent cybersecurity and operational resilience requirements for financial institutions and their technology providers operating in the EU. So now what? 

Non-compliance isn’t just risky—it has real regulatory and business consequences, including mandatory contract termination for non-compliant ICT vendors.

But achieving DORA compliance across today’s sprawling, complex infrastructure is no small feat. From on-prem data centers to cloud-native environments and dynamic DevOps pipelines, financial organizations and ICT providers alike face an uphill battle: securing every access point, ensuring continuous monitoring, and maintaining productivity without compromise.

  • Eliminate credentials and standing privileges to reduce unauthorized access risks
  • Implement dynamic, least-privilege access controls with short-lived certificates
  • Gain real-time visibility, auditing, and automated incident response
  • Support operational continuity while boosting developer productivity
  • Align with DORA’s five-pillar ICT risk framework

Speaker: Naime Surenkok

Senior Sales Engineer & OWASP, Detectify

Today, security teams want to cover everything across their digital attack surface. But knowing what you’re exposing and what you should be scanning remains a challenge. You’re covering your core web apps, but if you were asked today, "What other apps should we be covering?" The answer is often, "I'm not sure." Why is that? Because always knowing the right targets to scan and why you should scan them is unlikely for any individual or even an entire security team. But does it have to be this way?

Join our table where we will tackle this challenge head-on with a hacker's mindset.

Questions we’ll cover:

  • How does your organization select targets to scan?
  • What are the factors you consider when selecting targets to scan?
  • How do you work with vendors to help you figure out what to scan?
  • How do you see these challenges evolving with AI tools becoming more involved in AppSec?

Folks who come to our table will get insights into:

  • Why attackers don’t care about what you think is exposed, they care about the apps you miss. How diving into the signals – like the presence of JS libs, cookie consent, specific headers, or analytics, PII data – can reveal hidden web applications that you may not be aware of.
  • How it’s possible to keep an eye on everything you’re exposing, all while knowing when you should be taking a closer look at an application that you didn’t know about that could be hacked. You can go from just knowing your top 10 apps to knowing everything.

Go Hack Yourself.

Speaker: Jon Neal

SVP & Field CTO, Saviynt

Speaker: Mehran Ahsant

IAM Manager Electrolux IAM and Global Security, Electrolux

As digital ecosystems grow, fragmented B2B connections creates security gaps, compliance risks, and poor user experiences. Siloed solutions lack scalability, interoperability, and trust across partners and suppliers.