INTEL Room

30 unique topics, 100+ expert speakers
join the discussion!

Innovation

Unveiling a Unique Approach to Cybersecurity.

The Grand Edition 2026 will feature 30 roundtable discussions, covering 30 unique topics organized under 3 critical focus areas for 2026, reflecting the latest challenges and opportunities in cybersecurity.

The discussions will be moderated by 60 industry experts and top-tier solution providers.

Power Players
0 +
Executives
0 +
Top Tier Vendors
0 +
Delve into our detailed agenda

Agenda

Please arrive early to secure your spot and ensure you don’t miss any important opening remarks.

Securing the New Non-Human Workforce: AI Agents and Machine Identities in Law Enforcement

Law enforcement agencies increasingly rely on AI-driven systems and machine identities—ranging from automated surveillance to digital case management tools. These “non-human actors” can outnumber human operators, raising new security, accountability, and governance challenges.

  • Managing the identity lifecycle of AI agents and automated systems while meeting national and EU data protection requirements (GDPR/Swedish regulations). 
  • Securing automated processes—such as predictive policing systems or automated reporting pipelines—against misuse, tampering, or insider threats. 
  • Embedding governance, auditability, and compliance into AI deployment from design to operations.

Green Room

12:10 Securing AI at Scale: Governance That Enables Innovation

Explore how leading enterprises implement secure, scalable AI pipelines without slowing adoption. Hear from in-house security leaders who balance governance with operational agility.

  • Best practices for AI agent oversight, runtime controls, and auditability.
  • Balancing security, compliance, and speed in enterprise AI deployments.
  • Lessons learned from scaling AI safely across multiple business units.
  • Preparing for upcoming regulatory guidance and identity management trends.

Blue Room

12:10 Beyond Checklists: Embedding Continuous Assurance in Operations

Gain insights on shifting from static compliance to measurable, operational resilience. Senior technical leaders share how automation and process integration drive real-world security outcomes.
  • Using automation to align with multiple regulatory frameworks without bottlenecks.
  • Transforming compliance from documentation into actionable, measurable practices.
  • Building frameworks that integrate IT, security, and risk for continuous assurance.
  • Real-world examples of resilience metrics and reporting across enterprise systems.

Are we ready for the next frontier when it comes to Quantum Computing and Cybersecurity? 

Balancing Compliance, Regulation, and Operational Efficiency in Public Security

Law enforcement and municipal IT departments must navigate strict regulatory frameworks without slowing mission-critical operations. This session explores strategies for ensuring compliance while maintaining agility.

  • Aligning IT, security, risk management, and HR to meet evolving legal and operational requirements in policing and municipal services. 
  • Transitioning from static, checklist-based compliance to continuous, automated assurance that scales across agencies. 
  • Avoiding bottlenecks in digital transformation and AI adoption while staying accountable to Swedish and EU regulations.

Awareness, Collaboration, and Workforce Limitations in Law Enforcement Cybersecurity

Talent shortages and fragmented inter-agency cooperation can limit cyber resilience. This session focuses on improving real-time awareness and leveraging cross-sector partnerships to strengthen defenses.

  • Enhancing inter-agency collaboration within Swedish municipalities and with national law enforcement authorities. 
  • Upskilling and cross-training teams to handle emerging threats, from ransomware to insider misuse of AI tools. 
  • Improving situational awareness with secure, coordinated incident response and intelligence sharing. 
  • Leveraging public-private partnerships for threat intelligence, workforce augmentation, and operational readiness.
By invitation only

Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!

Closing Innovator Keynote
Resilient Teams, Resilient Enterprise: Collaboration in Modern Security

Explore workforce innovation, inter-organizational coordination, and skills development for tackling emerging threats. Learn from in-house leaders who have successfully upskilled and mobilized cross-functional security teams.

  • Programs to upskill staff for AI-driven and automated threat landscapes.

     

  • Frameworks and tools for secure, cross-team, and inter-company collaboration.

     

  • Measuring workforce effectiveness and organizational resilience in real time.

     

  • Lessons from enterprises that have strengthened their security culture and operational readiness.
99%

Satisfied Delegates

Join us as we navigate the future of cybersecurity together.

SEE ALL UNIQUE TOPICS

Round Table Discussion

CONTRIBUTORS

Insights from inspiring Keynotes and leading industry Experts.

Under the patronage of

Sir Malcolm Larri

Chairman
Thomas Zuliani

Global CISO,
ARLA Foods

Jelena Zelenović Matone

Ciso of the Year, European Investment Bank

David
Jacoby

Pwn Star

Dr. Tim Nedyalkov

Former TISO, Commonwealth Bank of Australia

Deepak
Subramanian

Group CISO, EnergyOne

Jon
Neal

SVP & Field CTO, Saviynt

Dan Anconina

CISO, XM Cyber

Philip Wiberg

Senior Solutions Engineer, AKAMAI

Yacine Zaitri

Accenture

Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Smeden Svahn

CISO, Adda

Trish McGil

Chief Cyber Security Strategist ,De Heus Voeders

Jan Öhman

Information Security Evangelist

Sanjay Kumar

Threat Intelligence Manager, Landis+Gyr

Christian Hedström

CISO, QD Sverige AB

Anders Jared

CISO, Bravida

Nithin Krishna

Head of Cyber Security, Jeppesen

Lars Ponten

Cybersecurity Evangelist

Prof. Shahid Raza

Professor, University of Glasgow, UK

Daniela Almeida Lourenço

Global CISO, Hunkemöller

Björn Johren

CISO, Max Matthiessen AB

Surinder Lall

Former SVP Global Information Security Risk Management

Giovanni Söderman

Vice President Global IT, Consilium Safety Group

Martin Vallee

CISO,CSO & Head of DevOps, Eyeon Group

Shahmeer Amir

Ethical Hacker

Thomas Evertsson

Head of IT, Swedish Film Institute

Teresia Willstedt

ISO, MedMera Bank

Dag Friden

Chief Information Security Officer, Aros Kapital

Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller

Thea Sogenbits

CISO, Estonian Tax and Customs Board

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Georgios Kryparos

CISO, Einride

Johan Nordin

Director of IT & IS, Extenda Retail

Thomas Warneryd

CISO,Scandi Standard

Adnan Jamil

CTO, Frank Penny

Elnaz Tadayon

Cybersecurity Manager, H&M

Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

Thom Langford

EMEA CTO, Rapid7

Tom Kjølhamar

Leder for IT-sikkerhet, Moelven Industrier Censys

Bala Periasamy

Nordic Product Industry Security Lead, Accenture

Hugo Sigurdson

Security Engineer, CrowdStrike

Kouadio Simon N'zué

Aircraft System Engineering, Airbus

Jan Olsson

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Gareth O'Sullivan

Lead Trust & Security Engineer for EMEA, Bugcrowd

Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Peter Hampus

CIO, Nackademin

Jaens Stafren

Account Executive EMEA, Keeper

Stephen McDermid

Regional CSO, EMEA, OKTA

Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Christian Reinhardt

Director Human Risk Management, SoSafe

Russ Bentley

Executive Vice President Product Marketing, Zerofox

Akhilesh Mandowara

Executive consultant, EMEA Practice Leader – Cloud & Infrastructure Security, IBM Cybersecurity Services

Johnny Krogsboll

Technical Security Leader, Palo Alto Networks Sweden

Peter Lundell

Public Sector Account Manager, Elastic

Santhosh Jayaprakash

Founder & CEO, Unosecur

Boaz Barzel

Field CTO, OX Security

Dirk-Jan van Helmond

Director, Solutions Engineering, Cloudflare

Stefan Lager

CTO Services, Sciber

Jared Henderson

Founder, Falx Cyber Security (Teleport)

Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec

Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Sayantan Dey

Legal Counsel / Compliance Officer/ Risk Management Expertise, Sandvik

Predrag Gaic

Chief Information Security Officer, Viedoc

Richard Rosengren

Territory Sales Manager, Thales

Sharon Larsson

CISO, Svenska Spel

Rolf Lindby

CIO, Bulls Press

Anders Thingholm

CIO, Bulls Press

Martin Karlsson

CISO, AP3

Per Gustavsson

CISO, Stratsys

Thomas Norlin

Senior Enterprise Sales Executive, Akamai

Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

Naime Surenkok

Senior Sales Engineer & OWASP, Detectify

Lydia Meneses

(CISA) | SOC Manager,OKQ8

James Johnson

Regional Sales Director, Northern Europe & Middle East, Bitdefender

Steven Duckaert

EMEA pre-sales team, Upwind

Marcin Zimny

Senior Principal Solution Architect, Ping Identity

Naz Bozdemir

Product Marketing Lead, HackerOne

Mehran Ahsant

IAM Manager Electrolux IAM and Global Security, Electrolux

Darren Kingsnorth

Head of Threat Intelligence & Analytics, Admiral Group

Anoop Chopra

Former CISO, IAG

Sebastian Hedlund

Application Security Specialist, F5

Peter Wilbrink

Regional VP- Nordics & Benelux, Digicert

Many More Power Players to Come

Thomas Zuliani

Global Chief Information Security Officer

Thomas Zuliani is a seasoned cybersecurity expert and the Global Chief Information Security Officer (CISO) at ARLA Foods, with extensive experience in leading security strategies across multinational organizations such as Pandora, Vestas or Siemens. He has a proven track record in risk management, data protection, and securing global infrastructure. Passionate about driving innovation in cybersecurity, Thomas is committed to safeguarding the integrity of digital transformation and ensuring compliance with industry standards, which granted several awards and recognitions on the past years, such as

  • Top Global CISO in the World by Cyber Defense Magazine 2024
  • Best Global CISO Top100 by HotTopics 2023 & 2024
  • Top 3 Best CISO Denmark by ComputerWorld 2022

Board Memberships & Advisory Roles: Nordic CISO Governing Body (Evanta/Gartner), Executive Advisory Board (IDC, SailPoint and Orange Cyber Defense)

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force

CISO of the year award for 2019, Luxembourg. The Global Cyber Sentinel Award Winner 2020 for immense contribution to cybersecurity domain globally. CISO of the year Europe 2021.

Versatile and innovative professional with emphasis on cyber security risk management, policies and procedures creation, IT/IS security, IT Operations, audit, risk mitigation, business process improvement and IT governance. Proven results in building internal and external client relationships, even at government levels for best cybersecurity practices, and driving growth in competitive and ever-changing markets. Proactive in assessing and responding to market and consumer trends. Highly effective at identifying and implementing business process improvements while safeguarding and adding to controls. Skilled at communicating effectively with clients, senior management and colleagues. Speaker at various events, such as UN, Risk.Net, RiskMinds, GISEC, etc.

Specialties: Cybersecurity, Policy development, IT Change and Incident Management development and implementation, IT Security, people management, SLA managment, Auditing financial systems, Risk management, Negotiations, Creative problem solver, Analytical thinker, Strong decision maker, Results driven, Innate ability to develop interpersonal relations, Proven leadership in all aspects of the workplace, Project Management, Risk Assessment & Mitigation, IT Governance & Stakeholder Liaison, Organizational Leadership & Change, COSO/COBiT Controls, Bloomberg, Microstrategy, Business Process Improvement, SOX, AutoAudit/Focus/SQL/Visio/ACL/MS Access, EBA, and ISO/IEC 27001:2013

David Jacoby

Chairman

David Jacoby is one of Sweden’s most boldest hackers and IT security experts. He has over 25 years of experience in professional hacking and has won several awards both as a speaker and for his unique research and dedicated work to stop digital crime. In addition to his own research, he was one of the main hackers in HACKAD_ a Swedish TV show named “HACKAD_” where David and three colleagues have hacked Swedish companies live on the TV screen to show the complexity and necessity in issues such as IT security.

Dr. Tim Nedyalkov

Former TISO, Commonwealth Bank of Australia

Dr. Tim Nedyalkov is a globally recognized cybersecurity and AI security leader with over 20 years of experience in technology, cybersecurity, and digital risk, spanning across Europe, the USA, Australia, and the Middle East. A distinguished expert and keynote speaker, he has held executive cybersecurity roles at the Commonwealth Bank of Australia, Riyadh Metro Network, and Australian Broadcasting Corporation. Tim holds a doctorate in Cybersecurity & Information Assurance from the University of Fairfax and a master’s degree in IT Management from the University of Sydney, along with certifications such as C|CISO, CISSP, CCSP, CISA, CISM, CRISC, CGEIT, CDPSE, and ISO 27001 LA. Tim has been a frequent keynote speaker and panelist at over 70 industry-leading conferences. Tim’s leadership in cybersecurity has been recognized as the 2024 iTNews Benchmark Security Leaders in Finance, 2022 Cyber Security Personality of the Year, 2022 Onalytica Who’s Who in Cybersecurity Influential Voices, and 2022 Top Cyber News Magazine 40 under 40 in Cybersecurity.

Deepak Subramanian

Group CISO, EnergyOne

I am a security enthusiast who likes to work on intriguing computer security problems. I believe heavily in the importance of good programming skills for a security professional and love to contribute towards open source projects.

I am a pioneer of the concept of “relationship between vulnerabilities” and have several publications in this area. I have a strong technical background in areas of malware analysis, vulnerability analysis.

Specialties: Relationship between vulnerabilities, Malware behavioral analysis, System architecture, System design, Vulnerability analysis, Project Management, Penetration Testing, Programming ( Java, J2EE, C, Objective-C, C++).

Dan Anconina

CISO, XM Cyber

Dan Anconina is the Chief Information Security Officer (CISO) at XM Cyber, where he leads the cybersecurity department with a focus on innovation and maintaining a low-risk tolerance in the ever-evolving cybersecurity landscape. 

With a strong technical background and hands-on experience, Dan plays a pivotal role in advancing XM Cyber’s security posture. In addition to driving technical initiatives, Dan oversees governance, risk assessments, and compliance (GRC) efforts to ensure holistic risk management. 

With over 11 years of experience, Dan has built and managed GRC, Infosec, and SOC teams from the ground up and has been deeply involved with creating and establishing cross-company procedures. 

Prior to XM Cyber, Dan held several roles at CheckPoint technical support center, leading VIP customers and managing security teams. 

Dan holds a BSc in electrical engineering and communication and brings valuable experience in M&As, securing development lifecycles, and risk assessment.

Philip Wiberg

Senior Solutions Engineer, AKAMAI

With a strong background in network and security, Philip’s understanding of the network security threats we face today, combined with an understanding of business value drivers, is an excellent combination in the modernization of the security landscape.With more than a decade of experience in network security, Philip delivers a powerful message that’s impossible to tune out.

Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Zsolt is a seasoned cybersecurity professional with a career spanning over 15 years. As a Group Cybersecurity Lead, Zsolt has built robust security programs and assembled high-performing teams for some of the world’s Top 100 high-traffic websites, technology companies and payment systems. With a dedication to cybersecurity he has significantly contributed to making the digital world a more secure space for everyone. Known for a strategic, data-driven approach, Zsolt’s expertise in risk management and incident response has been instrumental in mitigating security threats for businesses of all sizes.

Smeden Svahn

CISO, Adda

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Jan Öhman

Information Security Evangelist

Proven leader with 30 years of senior management experience from the software and manufacturing industries. As the CEO I managed a company from its inception through twelve years of strong international growth to revenues of 200+ MSEK and over 150 employees – all while delivering double digit EBITDA margins. As the CIO/CISO I have been deeply involved in ensuring adequate information security and in developing a combined management system very successfully obtaining and maintaining certificates for ISO 9001 and ISO 27001. Key success factor have been staff empowerment, trust building and a leadership boosting engagement.

Sanjay Kumar

Threat Intelligence Manager, Landis+Gyr

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Christian Hedström

CISO, QD Sverige AB

Christian is the Chief Information Security Officer (CISO) at QD Sverige AB, a prominent Swedish Managed Service Provider (MSP) established in 1989. With over 25 years of IT experience, Christian has excelled in IT operations, helping customers maximize their IT investments. He successfully led an ISO 27001:2022 certification from scratch, launched impactful security awareness programs, developed IT security services, and conducted thorough security assessments covering both Governance, Risk, and Compliance (GRC) and technical aspects. As a dedicated cybersecurity ambassador, Christian bridges the gap in understanding between boards, executives, techies and users, fostering a culture of security awareness and resilience. CISO and consultant. IT- and information security expert with more than 25 years of experience.

Anders Jared

CISO, Bravida

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Nithin Krishna

Head of Cyber Security, Jeppesen

For over 19 years, I have served as a Cybersecurity Architect, Leveraging industry-recognized certifications like CISSP, OSCP, and AWS-Sec, I possess in-depth expertise across various cybersecurity and cloud domains. I am passionate about empowering organizations to safeguard their data and assets from ever-evolving cyber threats, ultimately optimizing their overall security posture and performance.

Lars Ponten

Cybersecurity Evangelist

Lars has worked over 20 years with logistics systems for the Swedish Armed Forces as programmer, security architect etc etc, protecting very sensitive information. Lars has worked 5 years with digital healthcare SaaS-solutions, for example as CISO for Doctrin and for ImagineCare, protecting sensitive patient data.

Prof. Shahid Raza

Professor, University of Glasgow, UK

Shahid Raza, an internationally renowned cybersecurity expert, is a Full Professor and the Chair of Cybersecurity at the University of Glasgow, Scotland, UK. He co-founded Cybercampus Sweden (cybercampus.se), serving as its Research Director, and is affiliated with RISE Sweden and Mälardalen University (MDU) as Research Director and Professor, respectively. As Director of the Cybersecurity Unit at RISE Sweden for eight years, Shahid established it as one of Sweden’s largest technical cybersecurity groups, pioneering research in fundamental and applied cybersecurity. He also founded the RISE Cyber Range and the Swedish Cybersecurity Research and Innovation Node (cybernode.se). Shahid’s scholarly contributions, with over 7,000 citations, are published in leading journals and conferences. He holds a Swedish Docentship from Uppsala University, a PhD from Mälardalen University, and an MSc from KTH, all in cybersecurity. Homepage: https://shahidraza.net

Daniela Lourenço

Global CISO, Hunkemöller

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Giovanni Söderman

Vice President Global IT, Consilium Safety Group

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Martin Vallee

CISO,CSO & Head od DevOps, Eyeonid

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Shahmeer Amir

Ethical Hacker

Shahmeer Amir is a world-renowned Ethical Hacker and the 3rd most accomplished bug hunter who has helped over 400 Fortune companies, including Facebook, Microsoft, Yahoo, and Twitter, resolve critical security issues in their systems.
Shahmeer is the Cyber Security Advisor to the Ministry of Finance Government of Pakistan, involved in multiple projects regarding Deep Sea Tracking, Digital Transformation of Legislation, and Digitization of Pakistani Cultural Content. He is also a member of Forbes Technology Council.
As an Engineer and a Cyber Security professional with relevant certifications from renowned organizations like EC-Council, Mile2, SANS, etc., Shahmeer is currently looking at the Blockchain technology for his doctorate. He has authored three books, including Bug Bounty Hunting Essentials, and a dozen research papers.
Shahmeer is a highly sought-after keynote speaker on Cyber Security, Blockchain, and other technologies, having been invited to over 80 conferences globally. including Blackhat, GiSec, FIC, AEC Alberta, Hackfest and many more. He has also been accepted at multiple prestigious academic institutions in their entrepreneurship programs, including Stanford. As a CTO of companies, Shahmeer has learned to code in 25 languages and read code in 35, making him an expert in multiple technologies.

Thomas Evertsson

Head of IT, Swedish Film Institute

Thomas Evertsson Norrevik is a seasoned technology leader with over 25 years of experience, specializing in transforming IT operations and building high-performing teams. His professional expertise encompasses infrastructure modernization, digital workplace transformation, and strategic technological innovation. At the forefront of emerging technologies, Evertsson is particularly passionate about integrating artificial intelligence into organizational strategies, helping businesses leverage AI to enhance operational efficiency, drive innovation, and unlock new competitive advantages. His leadership approach focuses on developing collaborative environments, strengthening security measures, and guiding organizations through complex digital transformations with strategic thinking and clear communication.

Teresia Willstedt

ISO, MedMera Bank

Teresia is the ISO and main responsible of Business Continuity at MedMera Bank, Sweden. She loves working within IT-security since you will always have something to do and you will always learn more. Passionate within her field 2023 she also started offering to share her knowledge within information security to childrens in middle school age, to contribute to a more secure, future society.

Dag Friden

Chief Information Security Officer, Aros Kapital

Previously, I worked as an IT manager and service owner at companies in the AcadeMedia group, IT manager at the financial company Aros Kapital where a major focus was on regulatory compliance, safe and stable operation of the company’s systems and working for a continuous digitization of the business.
Worked before the position at Aros as development manager at Eventful and before that as IT strategist for Vaxholm city and consultant at Pulsen. Studied computer engineering at Chalmers and holds several certifications from Microsoft in both communication, mobility, Azure and client management. Has attended training in and worked with project management.
Completed migration from Exchange OnPrem to Office 365 in Nynäshamn, Heby, etc. Is the main writer and project manager in developing Vaxholm’s city’s IT strategy.

Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thea Sogenbits

CISO, Estonian Tax and Customs Board

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Georgios Kryparos

CISO, Einride

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Johan Nordin

Director of IT & IS, Extenda Retail

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thomas Warneryd

CISO,Scandi Standard

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Adnan Jamil

CTO, Frank Penny

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Elnaz Tadayon

H&M

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thom Langford

EMEA CTO, Rapid7

Thom serves as EMEA CTO at Rapid7. With over two decades of experience in security strategy, information security, and risk management, Thom has built a reputation for bridging the gap between technical teams and business executives. He is known for his pragmatic approach to cybersecurity, focusing on aligning security initiatives with business objectives to drive growth and resilience. Thom is also a sought-after speaker, writer, and thought leader in the cybersecurity community, often addressing topics such as organisational risk, security culture, and the evolving threat landscape. Thom’s expertise has been instrumental in shaping robust security postures for global organisations across various industries.

Tom Kjølhamar

Leder for IT-sikkerhet, Moelven Industrier Censys

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Bala Periasamy

Nordic Cyber Security Industry Lead, Accenture

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Hugo Sigurdson

Security Engineer, CrowdStrike

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Kouadio Simon N'zué

Aircraft System Engineering, Airbus

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Jan Olsson

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Fraud expert From the time at the police’s national fraud center with 30 years of experience in police work and 14 years dedicated to Fraud. Since autumn 2018, more against complex cybercrimes at the Swedish Cybercrime Center (SC3). Lectures nationally and internationally on everything from Social Engineering complexity to Monetary threats and societal consequences of laxity around Cybercrime and Fraud.

Gareth O'Sullivan

Lead Trust & Security Engineer for EMEA, Bugcrowd

Gareth joined Bugcrowd in May ’21 as the Lead Trust & Security Engineer for EMEA. He’s an experienced business, technology and information security professional. With over fifteen years of experience in the security industry, primarily focused on security testing, compliance and secure software development. In previous roles he’s led a startup, built a reseller channel, and led sales engineering teams for other well-known technology companies.

Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Elpidoforos Arapantonis is a Senior Security Officer in the energy sector with extensive experience in Information and Cyber Security. Over the past decade, he has held key security roles in the automotive and energy sectors, he has worked with OEMs and suppliers to strengthen security strategies, implement risk mitigation measures, and align cybersecurity practices with industry standards. 

Peter Hampus

CIO, Nackademin

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Jaens Stafren

Account Executive EMEA, Keeper

Jaens Stafren is a seasoned sales professional with extensive experience in the cybersecurity industry. He has over 20 years experience in helping organisations strengthen their security posture, working with businesses of all sizes from small start-ups to global enterprises. Jaens worked with EMC, Dell Software and VMware prior to joining Keeper Security, where he is dedicated to helping organisations to stay one step ahead in today’s ever-changing digital landscape.

Stephen McDermid

Regional CSO, EMEA, OKTA

Stephen has led and been responsible for several enterprise wide transformations ranging from National Government transformation projects to ISO27001 and PCI-DSS accreditation across multiple sites. He’s taken his hands on knowledge and expertise and used them to help organisations manage security across a broad range of disciplines and ensure senior stakeholders understand the risks and more importantly the opportunities available to their business. He’s worked with some of the largest organisations across Military, Banking, Government and Enterprise sectors such as NATO, UN, BoE and the UK Home Office.

Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Trevor Dearing has worked in networking and security for over 40 years. He has attended the birth of nearly all the technologies that we now take for granted including, Ethernet Switching, VPNs, Firewalls and virtual networks. Originally an engineer working on some of the first network and cyber security systems, he is now the Global Director of Critical Infrastructure Solutions for Illumio.

Christian Reinhardt

Director Human Risk Management, SoSafe

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Russ Bentley

Executive Vice President Product Marketing, Zerofox

Russ Bentley is Executive Vice President, Product Management at Zerofox. During his 15+ years in Cyber Security he has led the development of a variety of innovative security products in categories including security operations, threat intelligence, email security and endpoint protection at vendors including BAE Systems, ReliaQuest and Digital Shadows. He is passionate about building easy to use products that help security practitioners protect organizations from digital threats and has enjoyed helping customers as diverse as national militaries, global media companies, financial institutions and medical device manufacturers achieve their security goals.

Santhosh Jayaprakash

Founder & CEO, Unosecur

Santhosh is the founder of Unosecur, a next-gen cybersecurity startup focused on protecting enterprises from identity-based threats in the cloud era. A serial tech entrepreneur by passion, Santhosh brings deep, hands-on experience across international cloud, security, and big data consulting—paired with a strong track record in global sales, business development, and product strategy.

Over the years, he has led and contributed to high-impact initiatives in cloud sales, IT consulting, agile delivery, project and program management, and vendor strategy—working with global clients to deliver innovative, scalable solutions. His ability to drive both technical excellence and commercial success has been key to launching and growing Unosecur into a category-defining player in identity security.

Santhosh specializes in Cloud, Big Data, ML & AI consulting, SaaS sales, startup activation, go-to-market strategy, and product development. He’s especially passionate about emerging tech like IoT, AI automation, and VR—and thrives at the intersection of business, technology, and innovation.

Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

 Rui Shantilal is Vice President at Devoteam Cyber Trust, Devoteam’s cybersecurity unit. He co-founded Integrity in 2009, a firm specializing in cybersecurity consulting and technology auditing, which was acquired by Devoteam in 2021. With over 25 years of experience in information security and managed services, Rui has held leadership roles at Oni Telecom and GLINTT. He holds an MSc in Information Security from Royal Holloway, University of London, and certifications including CISSP, CISA, ISO 27001 Lead Auditor, and ITIL. Rui is known for his expertise in resilience-driven cybersecurity and frequently speaks on technology and information security topics

Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec

Louise has worked in various aspects of Cyber Security over the last decade, ranging from EDR, XDR, MDR and more, and one thing has remained true throughout; you cannot “product” your way out of user behaviour. Because the digital landscape is constantly evolving with new threats and vulnerabilities emerging regularly a one-time awareness training is insufficient. At every level of our organisations we must commit to arming our people with the knowledge required to stay vigilant, but the questions remains, what exactly is the best way to do this? 

Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Elena Marzi Tornblad is a cybersecurity engineer at RISE (Research Institutes of Sweden) with a combined background in engineering and law. She specializes in cybersecurity for vehicles and industrial control systems and brings solid experience in IT security. Elena is a CISSP-certified professional and supports organizations through guidance on regulations, standards, and risk analysis. At RISE, her role focuses on performing assessments and guiding companies toward compliance by integrating cybersecurity into their products. With a strategic and business-aware mindset, she works to ensure cybersecurity aligns with both organizational goals and regulatory expectations.

Sharon Larsson

CISO, Svenska Spel

Sharon is the CISO at Svenska Spel, the Swedish state-owned gambling company, which is also strongly involved in Sweden’s sports movement. Originally from Ireland and based in Sweden since 2006, Sharon has been working within IT & Operations organisations for 20 years with a broad range of roles from technical to leadership & strategic positions. Her background has spanned from driving change in large global companies to getting small start-ups off the ground, and has covered public institutions to private corporations and businesses. Information Security has been a primary focus for several years, where Sharon takes a hands-on approach in translating the various regulations and requirements into actions that are relevant to the business – keeping the human factor and people aspects central to driving a strong security culture.

Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

 Marius Baczynski is Director of Cloud Security Services at Radware. Backed by more than 20 years’ experience in cyber security sales and business development, he helps enterprises design and execute their digital transformation projects. Marius works with c-level execs to identify the right cloud strategy for their business and ensure that their migration to the cloud is secure and their applications are protected. Marius holds a Bachelor of Computer Science degree from University of Western Sydney, Australia and an MBA from Open University Business School in London, UK.

Moderator

To Be Announced

Moderator

As organizations increasingly deploy AI agents and autonomous systems, securing their identities throughout the lifecycle—from onboarding to decommissioning—has become critical. This session explores strategies for enforcing role-based access, automating credential management, and maintaining continuous policy compliance while enabling AI systems to operate efficiently.

  • Role-based access and automated credential lifecycle management.
  • Continuous monitoring for policy compliance.
  • Ensuring secure decommissioning of autonomous systems.
Moderator

To Be Announced

Moderator

Automated workflows and CI/CD pipelines often rely on high-value credentials and secrets that, if compromised, can lead to severe security incidents. This discussion covers practical approaches to securing keys, detecting anomalous activity, and enforcing least-privilege access without creating operational bottlenecks.

  • Detect and respond to anomalous credential usage.
  • Implement least-privilege access policies.
  • Secure CI/CD and AI automation pipelines without slowing innovation.
Sushil Shenoy

IT Security Specialist, VizRT

Moderator

AI-driven workflows can execute code autonomously, increasing operational efficiency but also introducing potential risks. This session focuses on containment strategies, sandboxing, real-time monitoring, and incident response planning to prevent rogue execution from causing disruption or damage.

  • Sandboxing and isolation strategies.
  • Real-time monitoring for unexpected behaviors.
  • Incident response protocols for AI-driven code execution.
Siegfried Moyo

Director, IT Security – (Deputy CISO), Americold Logistics, LLC

Moderator

As generative and predictive AI models are deployed across enterprises, understanding their provenance, training data, and deployment risks is essential. This session provides frameworks for model governance, data protection, and approval workflows to ensure responsible, auditable AI operations.

  • Track model provenance and lineage.
  • Prevent data leakage during training and inference.
  • Approval workflows for production deployment.
Moderator

To Be Announced

Moderator

Operating AI systems in live environments introduces dynamic risks. Learn how to define operational boundaries, integrate human oversight, and set up monitoring and alerting mechanisms that maintain both compliance and agility in high-stakes operations.

  • Define operational boundaries for autonomous agents.
  • Integrate human-in-the-loop review processes.
  • Alert and respond to compliance or behavioral deviations.
Moderator

To Be Announced

Moderator

AI agents often interact with sensitive data, making it vital to apply robust data protection strategies. This session explores encryption, tokenization, access governance, and audit trail practices to minimize exposure while enabling AI-driven decision-making.

  • Implement encryption, tokenization, and access controls.
  • Maintain comprehensive audit trails.
  • Reduce exposure through intelligent data governance policies.

Moderator

To Be Announced

Moderator

Autonomous systems can behave unpredictably, potentially creating self-propagating risks. This discussion covers behavioral anomaly detection, leveraging AI for threat intelligence, and implementing containment and rollback strategies to mitigate rogue AI actions.

  • Behavioral anomaly detection.
  • AI-assisted threat detection.
  • Containment and rollback strategies.
Elnaz Tadayon

Cybersecurity area manager, H&M

Moderator

Enterprises need to maintain security while avoiding lock-in with specific AI vendors. This session explores open standards, interoperability, and monitoring frameworks that ensure security and governance across multi-vendor AI environments.

  • Open standards and interoperable monitoring frameworks.
  • Cross-platform governance for multi-vendor environments.
  • Maintain security without sacrificing flexibility.
Bernard Helou

Cybersecurity Manager, Schibsted Media

Moderator

AI systems can occasionally act outside intended parameters, creating operational or security incidents. This session addresses detection, escalation, containment, and post-incident analysis to prepare teams for autonomous agent misbehavior.

  • Detection and escalation protocols.
  • Containment and mitigation strategies.
  • Post-incident analysis and lessons learned.

Moderator

To Be Announced

Moderator

Organizations must ensure AI operations comply with GDPR, the AI Act, and other regulations. This session explores embedding compliance controls into operational workflows, mapping regulatory requirements to AI systems, and preparing audit-ready evidence.

  • Map regulatory requirements to operational workflows.
  • Collect audit-ready evidence automatically.
  • Embed compliance controls into daily AI operations.
Daniel Westbom

IT Risk & Security Manager, SEB

Moderator

Compliance with multiple overlapping frameworks can be complex. This discussion covers aligning controls to business operations, avoiding duplication, and measuring effectiveness to achieve smooth regulatory alignment without sacrificing operational agility.

  • Map controls to business processes.
  • Eliminate duplicate efforts across frameworks.
  • Measure and track compliance effectiveness.
Moderator

To Be Announced

Moderator

Static audits are no longer enough. This session explores embedding continuous compliance and assurance into operations, enabling real-time monitoring, cross-team collaboration, and proactive gap resolution.

  • Automated evidence collection and dashboards.
  • Cross-team integration between IT, HR, and risk.
  • Rapid identification and resolution of compliance gaps.
Moderator

To Be Announced

Moderator

Manual compliance processes create inefficiencies and increase risk. Learn how to integrate IT and HR systems to automate evidence collection, streamline reporting, and enforce consistent policies.

  • Standardized data formats for reporting.
  • Integrations for real-time audit evidence.
  • Streamlined cross-functional reporting workflows.
Moderator

To Be Announced

Moderator

Translating AI regulations into actionable enterprise controls is essential. This session provides practical strategies for risk categorization, documentation, and inspection readiness for AI systems.

  • Categorize AI systems by risk level.
  • Implement transparency and documentation measures.
  • Prepare for regulatory inspections proactively.
Staffan Fredriksson

CISO,
Regent AB

Moderator

Henrik Tholsby

CISO, Danderyds sjukhus

Moderator

Striking a balance between operational efficiency and regulatory compliance is critical. This session highlights prioritization frameworks, automation tools, and performance measurement to achieve both goals.

  • Prioritize high-risk areas for oversight.
  • Delegate through automation to reduce bottlenecks.
  • Measure risk-adjusted operational performance.
Moderator

To Be Announced

Moderator

Organizations operating internationally must manage overlapping regulations. This session discusses frameworks to map obligations, assess risk priorities, and coordinate cross-border compliance.

  • Map local and global obligations.
  • Assess regional vs enterprise risk priorities.
  • Coordinate cross-border compliance initiatives.
Anders Johansson

CISO, Alfa eCare Group

Moderator

Mergers and acquisitions present unique compliance risks. Learn how to embed security and regulatory due diligence throughout the transaction lifecycle.

  • Pre-merger cybersecurity and privacy assessments.
  • Post-merger policy harmonization.
  • Address legacy systems and compliance gaps.
Jan Olsson

Kriminalkommisarie / Police Superintendent, Swedish National Police SC3

Moderator

Hybrid work increases complexity in maintaining compliance. This session focuses on policies, monitoring, and cultural strategies for securing distributed teams without reducing agility.

  • Endpoint and remote access controls.
  • Policy enforcement across multiple locations.
  • Promote a security and compliance-first culture.
Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Moderator

Leaders need measurable insights into organizational resilience. This session covers dashboards, automated alerting, and reporting frameworks for operational and compliance metrics.

  • Dashboards for key resilience indicators.
  • Automated alerts for control failures.
  • Documentation for leadership and regulators.
Victor Pettersson

CISO, Sokigo

Moderator

Sarbjit Singh

CISO, Mentimeter AB

Moderator

True compliance is cultural. This discussion explores leadership messaging, incentives, and integrating security and compliance principles into everyday workflows.

  • Leadership messaging and advocacy.
  • Incentivize proactive reporting.
  • Integrate compliance into everyday business processes.
Helene Neuss

Information Security Strategist, Länsförsäkringar Bank

Moderator

Gamze Zengin

Head of information security,
Intel Law

Moderator

Skilled cybersecurity professionals are in high demand. This session explores strategies for recruitment, career development, and retention to secure top talent in a competitive market.

  • Employer branding and recruitment strategies.
  • Career development pathways.
  • Retention programs for high-demand skills.
Moderator

To Be Announced

Moderator

Teams must be prepared for evolving threats, including AI-driven risks. Learn how to design training programs, simulations, and metrics for skill development.

  • AI security and automation-focused training.
  • Scenario-based simulations and exercises.
  • Skill tracking and competency measurement.
Johan Rosell

Head of Center for Cybersecurity, RISE

Moderator

Collaboration between sectors accelerates threat detection and response. Explore frameworks for intelligence sharing, coordinated response, and evaluating partnerships.

  • Share actionable intelligence securely.
  • Establish coordinated response frameworks.
  • Measure partnership effectiveness.
Jörgen Ottosson

CISO, BITS DATA

Moderator

Incident response effectiveness relies on preparedness and coordination. This session highlights training, roles, and post-incident analysis to strengthen response capabilities.

  • Cross-functional training programs.
  • Clear escalation paths and role definitions.
  • Post-incident analysis and continuous improvement.
Jakub Pasikowski

Information Security Manager, IT Compliance, Avalanche Studios

Moderator

Human limitations impact security operations. Learn strategies to monitor stress, implement support programs, and build resilience.

  • Monitor workload and stress indicators.
  • Implement well-being and counseling programs.
  • Build resilience into operations.
Sissy Papageli

Head of Security Incident Management, Ericsson

Moderator

International teams require consistent policies and flexible execution. This session covers coordination, communication, and tool centralization for global operations.

  • Align policies globally while empowering local execution.
  • Define communication protocols across time zones.
  • Centralized tools with flexible deployment.
Marius Ebel

Cybersecurity Contextualist & Conceptualist, Bilfinger

Moderator

Anette Karlsson

CISO, Intrum

Moderator

Engage teams with hands-on learning and gamification to improve skill retention.

  • Simulation-based exercises and scenarios.
  • Incentives, leaderboards, and measurable engagement.
  • Track knowledge retention and skill improvement.
Moderator

To Be Announced

Moderator

Effective collaboration depends on streamlined tools and processes. Explore strategies to reduce tool fatigue, enable real-time coordination, and enhance teamwork.

  • Evaluate ticketing, SIEM, and collaboration platforms.
  • Avoid tool fatigue and duplication.
  • Enable real-time coordination and alerting.
Smeden Svahn

CISO,
Adda

Moderator

Niclas Kjellin

Cybersecurity Expert, Cloud Security Alliance

Moderator

Knowledge sharing strengthens resilience. Learn how to exchange actionable intelligence securely, standardize reporting, and maintain trust across organizations.

  • Threat intelligence and mitigation strategies.
  • Standardized reporting formats for partners.
  • Ensure confidentiality and trust frameworks.
Moderator

To Be Announced

Moderator

Aligning security initiatives improves impact and efficiency. This session covers prioritization, coordination, and shared accountability across teams and sectors.

  • Coordinate timelines and goals across teams.
  • Identify overlapping initiatives and redundancies.
  • Establish shared accountability structures.
SEE ALL UNIQUE TOPICS

Round Table Discussion