INTEL Room
50 unique topics, 100+ expert speakers
join the discussion!

- AI & Emerging Technologies
- Cyber Awareness & Hygiene
- Cloud & Supply Chain Security
- Zero-Trust & Regulatory Adaptation
- 5G & Network Vulnerabilities
- Ransomware & Cyber Threats
Innovation
Unveiling a Unique Approach to Cybersecurity.
The Grand Edition 2025 will feature 50 roundtable discussions, covering 50 unique topics organized under 6 critical focus areas for 2025, reflecting the latest challenges and opportunities in cybersecurity.
The discussions will be moderated by 100 industry experts and top-tier solution providers.
Delve into our detailed agenda
Agenda
Please arrive early to secure your spot and ensure you don’t miss any important opening remarks.
"Venturing into the AI frontier: Unravelling the thrills and chills of cybersecurity's next big adventure!"
The way we choose to use AI is in our hands. For example, dynamite was originally invented by Nobel to assist in construction and mining, but over time it has also been misused for harmful purposes. In the same way, AI has the potential to greatly benefit us, and it should be harnessed to combat the threats posed by cybercriminals. What strategies CISOs must adopt to mitigate emerging risks. From adversarial attacks on AI models to the ethical implications of AI-driven decisions, this talk will delve into the most pressing issues security leaders face in today’s AI-driven world.
- Adversarial Threats and AI Exploitation
- AI in Cyber Defense vs. AI in Cyber Offense
- Ethics, Bias, and Trust in AI Systems
Keynote Speaker: Jelena Zelenović Matone, Senior Head, CISO, European Investment Bank
Keynote Speaker:
CIO, Nato
Akamai at the Orange Room
12:10 Making sure your business isn’t a “hole in one” for ransomware
We must prepare ourselves for the worst, we must ask ourselves
- "What if", not on a yearly review basis, but every day, what if we get ransomware?
- What if we do get extorted? What are the risks we are taking today?
- But most importantly, what's the cost?
We can improve our baseline security and effectively lower our risk-taking by some rather simple, modern methods.
Speaker: Philip Wiberg, Senior Solutions Engineer, AKAMAI
Accenture at the Purple Room
12:10 The AI Cyber Threat Landscape: What’s Coming Next?
As AI technology advances, so do the methods cybercriminals use to exploit it. Content We will introduce and showcase real-time demonstrations of AI-powered attack techniques (deepfake manipulation, AI-created phishing campaigns and fraudulent websites, AI developer tool injections)
Speaker: Yacine Zaitri Accenture
Akamai at the Orange Room
12:10 Making sure your business isn’t a “hole in one” for ransomware
We must prepare ourselves for the worst, we must ask ourselves
- "What if", not on a yearly review basis, but every day, what if we get ransomware?
- What if we do get extorted? What are the risks we are taking today?
- But most importantly, what's the cost?
We can improve our baseline security and effectively lower our risk-taking by some rather simple, modern methods.
Speaker: Philip Wiberg, Senior Solutions Engineer, AKAMAI
Accenture at the Purple Room
12:10 The AI Cyber Threat Landscape: What’s Coming Next?
As AI technology advances, so do the methods cybercriminals use to exploit it. Content We will introduce and showcase real-time demonstrations of AI-powered attack techniques (deepfake manipulation, AI-created phishing campaigns and fraudulent websites, AI developer tool injections)
Speaker: Yacine Zaitri Accenture
Are we ready for the next frontier when it comes to Quantum Computing and Cybersecurity?
As quantum computing advancements accelerate, the risks to classical encryption grow.
How should CISOs and security leaders prepare? Let’s hear from the experts and ask critical questions.
- How quantum computing threatens current cryptographic protocols like RSA and ECC?
- Could you shed light on post-quantum cryptography and its role in safeguarding digital assets?
- Share best practices for CISOs to future-proof their security frameworks
Speaker: Deepak Subramanian, Chief Information Security Officer, Energy One Limited
Speaker: Dr. Tim Nedyalkov, Former TISO, Commonwealth Bank of Australia
Language Models Under Fire: Security Challenges and Defense Tactics in the Age of Generative AI
Language models (LMs) are transforming industries, but they also introduce distinct security challenges that demand new approaches. This keynote highlights the most pressing risks: from passive and active data leaks, to adversarial attacks like prompt injection and input poisoning, and the emerging threats posed by autonomous models.
I will share real-world examples and mitigation strategies, along with model risk evaluation techniques to improve resilience.
Looking ahead, I’ll review how autonomous models may escalate risks through self-directed behavior and complex interactions, requiring proactive defenses.
- Awareness of language model-specific security vulnerabilities
- Overview of practical mitigation tactics
- Insight into future threats from increasingly autonomous AI
- A strategic outlook for securing generative AI systems
Keynote Speaker: Nir Chervoni, Head of Data Security, Booking.com
By invitation only
Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!
Are you reporting on Meaningful Risk or Vanity Metrics?
Traditional vulnerability management programs measuring how many CVEs are patched after 30-60-90 days will tell you that your team worked really hard to apply patches to the vulnerabilities that can be fixed, but will fail to tell you how much risk you actually reduced and what is the criticality of those exposures that you didn't fix. To report on meaningful risk you need to adopt metrics that will convey the risk to your business critical assets, the time it takes to discover and prioritize critical exposures in your environment, and the mean time to resolution (MTTR). Join the session to learn more about ways to upgrade your reporting metrics
Speaker: Dan Anconina, CISO, XM Cyber

Satisfied Delegates
Join us as we navigate the future of cybersecurity together.

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Global Director of Critical Infrastructure Solutions, Illumio

Executive consultant, EMEA Practice Leader – Cloud & Infrastructure Security, IBM Cybersecurity Services

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

Cybersecurity Specialist, RISE Research Institutes of Sweden

Legal Counsel / Compliance Officer/ Risk Management Expertise, Sandvik

Regional Sales Director, Northern Europe & Middle East, Bitdefender
Many More Power Players to Come
SEE ALL UNIQUE TOPICS
Round Table Discussion
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Giovanni Söderman
Vice President Global IT, Consilium Safety Group
As the Cyber Resilience Act (CRA) mandates organisations to bolster their cybersecurity frameworks, many are grappling with significant budget and resource constraints. The challenges of aligning with CRA requirements while operating under financial and personnel limitations needs to be discussed. Practical strategies need to take place for prioritising cybersecurity investments, optimising existing resources, and advocating for increased funding in an era where cyber threats are escalating.
- Balancing Compliance and Budget: Exploring cost-effective measures and prioritisation strategies to meet CRA requirements without overextending limited budgets.
- Resource Optimization: Identifying and leveraging existing tools, technologies, and human resources to maximise cybersecurity resilience despite staffing or technological shortages.
- Advocating for Cybersecurity Funding: Tactics for building a compelling case to stakeholders and leadership for increased investment in cybersecurity, focusing on the long-term risks of underfunding.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Zsolt Fabian
Group Cybersecurity Lead, Byborg Enterprises
Speaker: Peter Lundell
Public Sector Account Manager, Elastic
The digital landscape is evolving rapidly, and with it, the nature of cyber threats is becoming more sophisticated. As Artificial Intelligence (AI) continues to transform industries, it is also being harnessed by malicious actors to conduct more effective, intelligent, and automated cyber-attacks. These AI-powered attacks pose a significant challenge to organisations, as traditional security measures are often insufficient to detect and mitigate these advanced threats.We will delve into the growing trend of AI-driven cyber threats, explore the tactics used by attackers, and discuss how businesses can adopt AI-enhanced cybersecurity solutions to stay ahead of the curve.
- Understanding the AI Threat Landscape
- Why Traditional Cybersecurity Falls Short?
- Leveraging AI for Cyber Defense
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Martin Karlsson
CISO, AP3
Speaker: Dirk-Jan van Helmond
Director, Solutions Engineering, Cloudflare
As we stand on the cusp of a new technological era, businesses must navigate a landscape that is constantly evolving. Emerging technologies like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are not just buzzwords; they are powerful tools that can drive innovation, streamline operations, and create new opportunities for growth. We will explore how companies can strategically leverage these technologies to stay competitive and foster sustainable growth. By understanding the impact and potential of these advancements, businesses can not only keep pace with change but also lead it.
- Unlocking the Power of AI and Machine Learning: How AI can transform business operations through automation, predictive analytics, and personalised customer experiences?
- Case studies of companies successfully implementing emerging technologies such as AI, Blockchain and IoT to improve decision-making and reduce costs.
- Best practices for integrating emerging tech into existing business models to drive innovation and efficiency.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Smeden Svahn
CISO, Adda
As the Nordics experience a surge in phishing attacks targeting businesses and consumers, we must play a proactive role in safeguarding digital ecosystems. Cybercriminals are using increasingly sophisticated methods to exploit vulnerabilities, making it imperative for service providers, software vendors, and cybersecurity firms to enhance their defence strategies.
- Evolving Phishing Tactics in the Nordics
- Impact on Critical Sectors
- Countermeasures and Best Practices
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Lydia Meneses
(CISA) | SOC Manager,OKQ8
Speaker: Stephen McDermid
Regional CSO, EMEA, OKTA
In today’s interconnected and globalised world, the security of supply chains has become more critical than ever. Disruptions, ranging from cyberattacks to geopolitical tensions, have highlighted the vulnerabilities that can cripple businesses. We will explore the importance of supply chain resilience, focusing on how companies can fortify their end-to-end processes. By implementing advanced security measures, developing flexible risk management strategies, and leveraging technology, organisations can create robust and adaptive supply chains that withstand challenges and drive sustained growth.
- Integrating Cybersecurity in the Supply Chain
- Building Flexible and Agile Risk Management
- Collaborating with Partners for Holistic Security
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Jan Öhman
Information Security Evangelist (Former CISO of Elisa Polystar)
Speaker: James Johnson
Regional Sales Director, Northern Europe & Middle East, Bitdefender
- Why automate? Understanding the effects of good (and bad) automation in IT Security
- Closing the skills gap leveraging technology
- Continuously identifying & reducing the attack surface
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Trevor Dearing
Global Director of Critical Infrastructure Solutions, Illumio
Speaker: Georgios Kryparos
CISO, Einride
In a world where cyber threats are evolving at an unprecedented pace, the traditional perimeter-based security models are no longer sufficient. Zero-Trust Architecture (ZTA) offers a transformative approach to modern security, shifting the focus from trusted networks to continuous verification of every user, device, and connection. How Zero-Trust is redefining the digital landscape, ensuring that security is embedded in every layer of access control, data exchange, and operational integrity? It’s a call for organisations to adopt a proactive defence mechanism in an increasingly borderless digital environment.
- Trust no one, verify everything: The shift from perimeter security. How does ZTA enforces the principle of “never trust, always verify,” ensuring each access request is authenticated and authorised regardless of location?
- How does Zero-Trust dynamically adapt to changing threat landscapes by constantly validating credentials and access points?
- Step-by-step guidance on implementing Zero-Trust across network infrastructure, including identity verification, least privilege access, and micro-segmentation.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Kouadio Simon N'zué
Aircraft System Engineering, Airbus
As the global adoption of 5G technology accelerates, it promises faster speeds, reduced latency, and increased connectivity across industries. However, with these advancements come new cybersecurity challenges. The vulnerabilities inherent in 5G networks and discuss strategies for safeguarding the future of connectivity. By addressing these risks, we can ensure the secure deployment and operation of 5G, which is critical for supporting next-generation applications like autonomous vehicles, IoT, and smart cities.
- How 5G’s use of virtualization and network slicing opens new avenues for cyber threats?
- What are the risks associated with compromised software, hardware backdoors, and potential state-sponsored espionage?
- Mitigating Risks in IoT and Critical Infrastructure.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Dimitrios Stergiou
Director of IT and Information Security, Taptap Send
Speaker: Steven Duckaert
EMEA pre-sales team, Upwind
Are you tired of dealing with misconfigurations in cloud infrastructure? Introducing the Innovator session!
Gain unparalleled insights from industry leaders who have revolutionised cloud security. Discover cutting-edge strategies and innovative solutions that will empower you to tackle challenges head-on.
Join the session and take control of your cloud security journey. Together, we can build a safer digital landscape.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Jan Olsson
Police Superintendent ~ Årets Säkerhetsprofil 2022, Polismyndigheten Swedish Cybercrime Center SC3
Speaker: Christian Reinhardt
Director Human Risk Management, SoSafe
In our increasingly connected world, cybersecurity is more important than ever. But too often, organisations and individuals become complacent after initial safeguards are in place. Cyber threats are constantly evolving, and so should our awareness and responses. We will dive into why cyber awareness must be an ongoing effort, not a one-time action, and how continuous vigilance can protect us from unseen dangers in the digital realm.
- “The Cyber Threat Never Sleeps”: Understand how cybercriminals continuously develop new tactics and why static defences won’t suffice.
- “Human Error: The #1 Cyber Vulnerability”: Learn why ongoing training and awareness are key to minimising the most common cybersecurity weakness—us.
- “Stay One Step Ahead”: Explore the latest trends in cybersecurity to understand why proactive measures and up-to-date security strategies are the foundation of long-term protection.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Christian Hedström
CISO, QD Sverige
Speaker: Thom Langford
EMEA CTO, Rapid7
Cybersecurity is no longer just an IT issue—it’s a business imperative. However, a gap often exists between the technical insights of CISOs and the strategic priorities of the management board. We will explore how organisations can build stronger bridges of communication and collaboration between these two crucial groups. By fostering mutual understanding, businesses can not only enhance their cyber resilience but also turn cybersecurity into a competitive advantage.
- Speak the Same Language: Translating Tech to Business Impact
- Cybersecurity as a Strategic Asset: Making Cyber a Boardroom Priority
- Bridging the Cultural Divide: Building Trust Between CISOs and Executives
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Anders Jared
CISO, Bravida
Speaker: Gareth O'Sullivan
Lead Trust & Security Engineer for EMEA, Bugcrowd
As the EU prepares to enforce its groundbreaking AI regulations, industries across the globe are left grappling with what compliance means in practice. The new EU AI Act sets ambitious standards for AI systems, aiming to balance innovation with ethical oversight.Let’s dive into the implications of these regulations, exploring how businesses can adapt, what loopholes still exist, and whether this new legal framework will truly tame the AI revolution or leave it in chaos.
- What are the key compliance challenges, and how can organisations ensure they align with these new rules while fostering innovation?
- Will the AI Act stifle creativity, or does it create new opportunities for ethical AI development?
- How will this regulation impact global AI development and adoption, and what does it mean for non-EU companies looking to do business in Europe?
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Nithin Krishna
Head of Cyber Security, Jeppesen
Speaker: Santhosh Jayaprakash
Founder & CEO, Unosecur
While the advantages and drawbacks of Zero Trust solutions have been widely debated, the greatest challenge lies in shifting the mindset of users. Educating individuals on adopting the Zero Trust approach is far more crucial than merely deploying the technology itself. The success of Zero Trust strategies hinges on effectively translating the concept into tangible business value.
- The Future of Zero Trust with Advanced Technologies and AI: As technology evolves, particularly with advancements in artificial intelligence, the Zero Trust framework will continue to evolve. AI will play a pivotal role in enhancing security through dynamic, real-time verification processes, automating threat detection, and responding to potential risks in a smarter, more adaptive manner.
- What Does “Always Verify, Never Trust” Mean? At the core of Zero Trust is the principle that no entity, whether inside or outside the network, should ever be trusted by default. Every access attempt must be continuously verified. This proactive stance ensures that the network remains secure, requiring constant authentication and validation of users, devices, and data before granting access.
- Zero Trust in the Cybersecurity Landscape: In cybersecurity, the Zero Trust model marks a paradigm shift from traditional perimeter-based defences. Instead of assuming that entities within the network are safe, Zero Trust operates under the assumption that threats can exist both inside and outside. This approach minimises risk by enforcing strict access controls, continuous monitoring, and verification at every step, ensuring a more resilient and secure environment.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Lars Ponten
Cybersecurity Evangelist
Speaker: Sharon Larsson
CISO, Svenska Spel
In the age of artificial intelligence, businesses and individuals are more connected—and more vulnerable—than ever before. While AI offers groundbreaking innovations, it also opens the door to new cyber threats. As technology evolves, so must our cybersecurity practices. How good cyber hygiene and compliance protocols are essential for safeguarding sensitive data, maintaining trust, and staying ahead of evolving threats? Join us to discover how combining traditional cybersecurity measures with AI-driven solutions can create an unbreakable digital fortress.
- “Smart Defences for Smart Attacks”: Learn how AI is transforming both sides of the cybersecurity landscape—making attackers more sophisticated and defences more dynamic. Understand the importance of proactive cyber hygiene practices to stay one step ahead of AI-powered threats.
- “Compliance in the Age of Automation”: Explore the evolving regulatory landscape, from GDPR to CCPA, and how businesses must adapt compliance measures to meet the challenges of automated data processing and AI integration.
- “AI + Human Vigilance = A Clean, Safe Digital Space”: Discover why AI alone is not a silver bullet and how fostering a culture of cyber hygiene—where human vigilance complements AI-driven defences—is key to long-term cybersecurity success.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Prof. Shahid Raza
Professor of Cybersecurity, University of Glasgow, UK
As we race into the 2025 and beyond, the next generation of communication, 6G, promises to natively integrate terrestrial networks with non-terrestrial networks, namely satellite, drones, planes, in addition to promising revolutionary advancements in speed and connectivity. However, this rapid evolution can bring a new set of vulnerabilities that could jeopardise our digital infrastructure. Join us as we dive into the emerging risks and strategies to safeguard our hyper-connected future. Explore the novel attack vectors and security challenges unique to 6G technology.
- Explore the novel attack vectors and security challenges unique to 6G technology.
- Analyse case studies and potential consequences of 5G network breaches on businesses and everyday life.
- Learn about cutting-edge security measures and proactive strategies being developed to protect the 6G ecosystem from future threats.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Sanjay Kumar
PhD, Cybersecurity | Threat Intelligence Manager, Landis+Gyr
Speaker: Rolf Lindby
CIO, Bulls Press
In this riveting session, we dive into the high-stakes world of ransomware attacks that have rocked Europe. From multi-million-dollar ransom demands to critical infrastructure disruptions, this case study sheds light on how various European countries have been fighting back against these relentless cyber threats. Discover the strategies, lessons learned, and innovative solutions that are shaping Europe’s cybersecurity landscape.
- The Ransomware Rising: A European overview
- Strengthening the frontlines: Europe’s defence strategies
- Lessons from the Battlefield: Building a resilient future.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Daniela Almeida Lourenço
Global CISO, Hunkemöller
Teresia Willstedt
ISO, MedMera Bank
Phishing simulations are crucial for maintaining a security edge. Currently, phishing your own users is just as vital as implementing cutting-edge cybersecurity solutions. Without training your team to remain vigilant, how can you ensure protection against phishing attacks?
- The increase of phishing attacks due to advanced technologies.
- Strategies for conducting sophisticated awareness programs for users.
- Methods for staying ahead of emerging threats.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Trish McGil
Chief Cyber Security Strategist | Executive Subject Matter Expert Cyber Security, De Heus Voeders
In an era where cyber threats are evolving at an unprecedented rate, it’s crucial to stay ahead of the curve. Join us as we delve into the latest innovations in cybersecurity that are set to revolutionise the way we protect our digital realms. From AI-driven threat detection to quantum encryption, this will showcase how emerging technologies are shaping the future of cyber defence.
- AI Revolution: Explore how artificial intelligence is revolutionising industries from healthcare to entertainment, and what ethical considerations come with its rapid advancement.
- Quantum Leap: Get a glimpse into the world of quantum computing, where the limits of classical computing are challenged, and see how this technology might solve complex problems faster than ever before.
- Sustainable Tech: Discover the latest in green technologies and sustainable practices, and learn how emerging innovations are working towards a more eco-friendly and energy-efficient future.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Anders Thingholm
Head of Information Security, DANX Carousel
With NIS2 enforcement reshaping expectations across sectors, Business Continuity Planning has become a strategic imperative. But what does real-world BCP implementation look like? This roundtable explores how organizations can move from static documents to dynamic resilience strategies that work under pressure.
- Why BCP is a core pillar of NIS2—and how to approach it differently from traditional crisis management
- Practical steps for designing, implementing, and testing a living BCP framework
- Turning continuity planning into business value: reducing downtime, increasing stakeholder trust, and supporting faster recovery
- Peer insights: what’s working, what’s not, and where to begin if you’re starting from scratch
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Adnan Jamil
CTO, Frank Penny
Organisations across various industries have embraced cloud computing to simplify their operations and enjoy its technological benefits. However, this transition is not without its challenges. In fact, it introduces significant concerns, as companies struggle to safeguard their cloud environments from prevalent security threats. Issues such as limited visibility and control over cloud infrastructure, unauthorised access, and external data sharing pose ongoing difficulties.
- Cloud Security Threats: 2025 and Beyond
- Regulatory Compliance: Is It Beneficial for Cloud Security?
- Strategies for Protecting Your Cloud Environment
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Adnan Jamil
CTO, Frank Penny
Speaker: Hugo Sigurdson
Security Engineer, CrowdStrike
As artificial intelligence continues to evolve and integrate into various sectors, its potential to revolutionise cybersecurity is accompanied by new and unprecedented threats. We will explore the dark side of AI, revealing how malicious actors are harnessing its power to orchestrate sophisticated cyber attacks. Attendees will gain insights into the emerging trends in AI-driven cyber threats, understand the vulnerabilities that are being exploited, and learn proactive strategies to defend against this high-tech menace.
- The Rise of AI-Powered Cyber Weapons: Uncover how AI is being used to automate and enhance cyber attacks, from deepfakes to autonomous hacking tools.
- Identifying Vulnerabilities in the Age of AI: Learn about the new security challenges posed by AI and how traditional defences are being outpaced by smart, adaptive threats.
- Strategies for Resilience and Defense: Discover cutting-edge techniques and best practices for leveraging AI in your own cybersecurity efforts to stay one step ahead of the attackers.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Per Gustavsson
CISO, Stratsys
Speaker: Thomas Norlin
Senior Enterprise Sales Executive, Akamai
Zero Trust is a forward-thinking cybersecurity approach that abandons the outdated perimeter-based security mindset. It assumes that no user or device—inside or outside an organization’s network—should be trusted by default. As remote work, cloud adoption, and advanced cyber threats become the norm, Zero Trust delivers a resilient strategy for reducing risk, managing access, and validating identity at every step. Its guiding principle is simple: trust nothing, verify everything.
- Continuous verification: Every access request is fully authenticated, authorized, and encrypted, regardless of origin or location.
- Least privilege access: Limit access strictly to what users and devices need, minimizing potential damage from compromised accounts or systems.
- Assume breach mentality: Zero Trust operates under the assumption that breaches will occur, focusing on containment, visibility, and rapid response rather than only prevention.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Dr. Tim Nedyalkov
Former TISO, Commonwealth Bank of Australia
Quantum computing is no longer science fiction—it’s fast becoming a revolutionary technology with the potential to reshape industries, crack previously unsolvable problems, and drive innovation. But with great power comes great responsibility. While quantum computers promise breakthroughs in fields like medicine, finance, and artificial intelligence, they also pose existential risks to cybersecurity and could widen the digital divide. In this session, we will explore the promise and peril of quantum computing, and whether it will lead us to a brighter future or usher in unforeseen challenges. Is it the blessing we’ve been waiting for, or could it become a curse in disguise?
- The quantum leap: Breakthroughs and opportunities
Quantum computing’s immense power can revolutionise sectors such as drug discovery, climate modelling, and artificial intelligence by solving complex problems that today’s supercomputers struggle with.
- Security: Savior or Saboteur?
While quantum computers could improve cryptography and enhance security systems, they also threaten to break the encryption methods that protect global financial systems, military secrets, and personal data.
- Widening the Tech Gap: Who Wins, Who Loses?
As quantum technology matures, the digital divide between countries and corporations may widen. Those who can harness its power will gain immense advantages, leaving others behind and potentially reshaping the geopolitical landscape.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Björn Johren
CISO, Max Matthiessen AB
Ransomware attacks have rapidly evolved into one of the most severe and pervasive cybersecurity threats, targeting businesses, governments, and individuals alike. The sophistication of these attacks has escalated, often resulting in catastrophic financial and operational impacts. The current state of ransomware, exploring recent high-profile cases, emerging trends, and the critical strategies needed to defend against this growing menace and business processes. How can this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture?
- The Rise of Double and Triple Extortion Tactics
- The Role of Ransomware-as-a-Service (RaaS)
- Strategies for Building Resilience and Response
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Martin Vallee
CISO,CSO & Head od DevOps, Eyeonid
Speaker: Rui Shantilal
Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit
As more organisations migrate to cloud-based environments, they find themselves facing a new set of cybersecurity challenges. While the cloud promises scalability, flexibility, and cost savings, it also brings its own stormy skies. The biggest cybersecurity challenges cloud users face today: Cloud Compliance, Lack of Skills, Identity and Access Management (IAM), and Shadow IT. Join our experts as they discuss these pressing issues and provide actionable insights on how to secure your cloud journey and weather any cybersecurity storm that comes your way.
- Cloud Compliance
- Lack of Skills
- Identity and Access Management (IAM)
- Shadow IT
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Thomas Warneryd
CISO, Scandi Standard
Speaker: Richard Rosengren
Territory Sales Manager, Thales
A major challenge many businesses face in cloud environments is the limited control and visibility over their systems and data. It’s essential to maintain full oversight of your cloud infrastructure to ensure data security and smooth operations. Without proper control and visibility, your organisation becomes vulnerable to data breaches, leaks, or even encryption attacks.
Thankfully, there are security solutions available to help mitigate these risks.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Shahmeer Amir
Ethical Hacker
As we transition into the 5G era, the enhanced speed and widespread availability bring unprecedented opportunities but also broaden the attack surface for cyber threats. However, solutions are available to secure and monitor 5G network traffic, safeguarding against unauthorised access and data breaches.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Johan Nordin
Director of IT & IS, Extenda Retail
Join our exclusive session on Supply Chain Attacks, tailored for professionals looking to deepen their knowledge of software supply chain vulnerabilities. Explore the complexities of these threats and learn strategies to protect your organisation from the risks posed by malicious actors. Gain valuable insights into identifying weaknesses within your supply chain and strengthening your defences to prevent breaches that could endanger critical systems and sensitive data. Don’t miss this opportunity to enhance your expertise and secure your digital assets.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Rolf Lindby
CIO, Bulls Press
Are you ready for the next wave of ransomware attacks? Join us for an eye-opening session that uncovers the dark progression of triple extortion. Imagine this: hackers breach a system, unleashing ransomware, but they don’t stop there. Before encrypting the data and locking out the victim, they steal sensitive information. Then, they push the extortion further by threatening the victim’s business partners and associates with a data leak, aiming to extract even more money. In this session, you’ll gain the tools and insights to defend your organisation against this escalating threat and protect your critical data from malicious attacks.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Thomas Evertsson
Head of IT, Swedish Film Institute
Speaker: Akhilesh Mandowara
Executive consultant, EMEA Practice Leader – Cloud & Infrastructure Security, IBM Cybersecurity Services
Speaker: Johnny Krogsboll
Technical Security Leader, Palo Alto Networks Sweden
As artificial intelligence transforms industries and powers innovation, it also opens the door to unforeseen threats. The same algorithms that drive progress can be weaponized for malicious purposes, making it essential for businesses and individuals to understand and address the risks. This presentation will highlight the growing dangers of AI-related threats, from data manipulation to deep fakes, and explore how to stay ahead of these evolving challenges.
- Deep fake Deception
- AI-Driven Cyber Attacks
- Ethical AI Dilemmas
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Teresia Willstedt
ISO, MedMera Bank
In today’s digital landscape, phishing attacks are more common than ever, often disguised as legitimate communications. This presentation will unravel the mysteries behind these deceptive schemes, helping you spot the fakes and protect your valuable information. Join us for a deep dive into the world of phishing and learn how to defend yourself from these cunning cyber threats.
- Spotting the Hook
- Reeling in the Scammers
- Safety Net Strategies
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Naz Bozdemir
Product Marketing Lead, HackerOne
Speaker: Smeden Svahn
CISO, Adda
Is cybersecurity a cost center or a profit protector? For too long, security leaders have struggled to justify their budgets in terms boards and business leaders can understand. It’s time to shift the conversation. This session introduces Return on Mitigation (RoM), a framework designed to quantify the financial impact of mitigated breaches, enabling leaders to position cybersecurity as a critical investment that enables business priorities.
In this session, you'll discover how to:
- Use the RoM calculator, built on widely accepted industry benchmarks like IBM’s Cost of a Data Breach Report
- Automate RoM calculations and generate real-time summaries tailored to your organization’s business and risk profile.
- Make data-driven business cases to your board and executive team, showing why offensive security programs are essential to operational continuity, brand protection, and long-term profitability.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Elena Marzi Tornblad
Cybersecurity Specialist, RISE Research Institutes of Sweden
Speaker: Marcin Zimny
Senior Principal Solution Architect, Ping Identity
Digital landscape, traditional security models are no longer sufficient to protect against sophisticated cyber threats. Enter Zero-Trust Security—a groundbreaking approach that operates on the principle of never trusting, always verifying. This presentation will explore how Zero-Trust can revolutionise your security strategy, providing a robust framework that anticipates and mitigates threats before they can compromise your systems.
- Uncompromising Security
- Enhanced Risk Management
- Seamless Integration
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Elpidoforos Arapantonis
Senior Information Security Officer, Vattenfall
Speaker: Marius Baczynski
Director - Cloud Security Services (EMEA), Radware
This presentation will explore how emerging technologies are reshaping the security landscape, presenting both new opportunities and challenges. We’ll delve into the latest advancements, from AI-driven security measures to quantum encryption, and discuss their implications for safeguarding digital assets. Discover how these innovations are revolutionising the way we protect our information and what steps you can take to stay ahead of cyber threats.
- AI and Machine Learning in Cyber Defense
- Quantum Encryption: The Future of Secure Communication
- The rise of decentralised security
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Dag Friden
Chief Information Security Officer, Aros Kapital
Speaker: Louise Lundgren
Regional Sales Director, Nordics & BeNeLux, OffSec
- Evolving Threats: Cyber threats are constantly changing. Staying updated on the latest risks ensures your defences remain effective and your data stays protected.
- Ongoing Education: Regular training keeps your team informed about best practices, empowering them to recognize and respond to potential threats swiftly.
- Adaptive Strategies: Continuous awareness helps in refining security policies and practices, ensuring they adapt to new vulnerabilities and attack vectors.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Anupama Jaiswal
Information Security Specialist, Truecaller
- Understanding the Threat Landscape: Learn about the increasing risks associated with third-party vendors and partners, including data breaches and cyber-attacks, and how they can impact your organisation.
- Effective Risk Management Strategies: Discover actionable strategies to assess and mitigate third-party risks, from due diligence to continuous monitoring, ensuring your cybersecurity measures extend beyond your direct control.
- Building Resilient Partnerships: Gain insights on fostering secure and trustworthy relationships with third parties, including best practices for contracts, compliance, and regular audits to fortify your overall cybersecurity posture.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Anupama Jaiswal
Senior Information Security & GRC Lead, Truecaller
- Unseen Risks: Learn how insider threats can quietly compromise your data and systems from within, often without detection until it’s too late.
- Detection and Prevention: Explore cutting-edge techniques and tools designed to identify suspicious behaviour early and prevent potential breaches.
- Real-World Case Studies: Discover lessons from recent insider threat incidents and how businesses like yours can bolster defences against these internal risks.
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Thea Sogenbits
CISO, Estonian Tax and Customs Board
- Targeted Precision: Explore how state-sponsored attacks are strategically designed to exploit specific vulnerabilities in national infrastructure, corporate systems, and critical technologies.
- Advanced Techniques: Discover the cutting-edge methods employed by nation-states to conduct cyber espionage, from sophisticated malware to zero-day exploits.
- Global Implications: Understand the far-reaching consequences of state-sponsored cyberattacks, including geopolitical tensions, economic impact, and the need for international
-
Read our Article about this Topic
- Read our Article about this Topic
Speaker: Roger Olmås
CISO, Rusta
- Phishing Phantoms: Learn how attackers use deceptive emails and websites to steal your confidential information. Spot the red flags before they hook you!
- Pretexting Perils: Discover how cybercriminals craft convincing stories to manipulate you into revealing personal details or giving away access. Stay one step ahead with our insider tips!
- Baiting Blunders: Understand the tactics behind fake offers or tempting downloads designed to lure you into compromising your security. Guard against these traps with our expert advice!
Speaker: Elnaz Tadayon
Cybersecurity Manager, H&M
Speaker: Bala Periasamy
Nordic Product Industry Security Lead, Accenture
In today’s interconnected economy, technology-driven supply chains enable the seamless flow of goods across borders. However, this reliance on digital systems also exposes these global networks to significant risks from cybercriminals and other malicious actors. To safeguard uninterrupted operations, implementing comprehensive, end-to-end security measures is no longer optional but essential.
- Cyber Vulnerabilities: Increasing dependence on technology makes supply chains prime targets for cyberattacks, threatening disruptions in critical sectors.
- Need for Comprehensive Security: Robust, multi-layered defences are crucial to detect, prevent, and respond to potential cyber threats throughout the supply chain.
- Impact on Global Economies: Disruptions in supply chains due to cyber incidents can have ripple effects, impacting global trade and economic stability.
Speaker: Peter Hampus
CIO, Nackademin
Speaker: Jaens Stafren
Account Executive EMEA, Keeper
The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution. Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you.
- What are the challenges in adjusting your PAM strategy as you grow
- Keeping up with compliance requirements
- How to choose a PAM solution that grows with you
Speaker: Russ Bentley
Executive Vice President Product Marketing, Zerofox
Learn how attackers exploit the digital footprint of business leaders and what can be done to mitigate these risks.
Synopsis: Europe's cyber threats have intensified in 2024, with sophisticated attacks targeting executives to breach enterprise networks. Social engineering, ransomware, and access broker markets pose significant dangers.
We will explore how to identify exposed information, understand potential exploitation methods, and implement effective mitigations. With limited resources and active dark web threats, organizations need strategic threat intelligence to defend against malicious actors in this rapidly evolving landscape.
- Learn how to proactively identify your exposed information before attackers find it
- Understand how cybercriminals leverage compromised information against executives and organizations
- Discover practical mitigation strategies for the evolving European cyber threat landscape
- Gain strategic approaches to threat intelligence that maximize limited security resources
- Get insights into dark web actor methodologies, including social engineering tactics, ransomware operations, and initial access broker marketplaces
Speaker: Boaz Barzel
Field CTO, OX Security
Speaker: Predrag Gaic
Chief Information Security Officer, Viedoc
Security leaders are expected to do it all—but where should CISOs really focus when it comes to Application Security? Join us for a high-impact session where we cut through the noise and break down what truly matters in AppSec. Discover strategic insights, actionable frameworks, and real-world approaches to making AppSec manageable—without the overwhelm.
- Clarify your role in AppSec to drive real security outcomes
- Overcome common roadblocks and avoid wasted efforts
- Learn from industry experts on how to balance security, speed, and innovation
Speaker: Stefan Lager
CTO Services, Sciber
Speaker: Sayantan Dey
Compliance Officer/ Risk Management Expert, Sandvik
As cyber threats grow increasingly sophisticated and stealthy, MDR has emerged as a preferred solution for organizations seeking 24x7 threat detection and incident response. However, not all MDR services are created equal; some fail to provide real, actionable outcomes and improvement.
This roundtable will explore the reality behind MDR offerings, what’s working, what’s marketing fluff, and how organizations can cut through the noise to find actual value. We’ll also explore how to evaluate MDR effectiveness, what is required from the customer, and what metrics matter when measuring success.
With real-world insights, peer experiences, and challenging questions on the table, this session will help you rethink how MDR fits into your broader security strategy.
- What does “effective MDR” actually look like in practice?
- How can you tell if your MDR provider is truly improving your security posture?
- What questions should you ask before choosing or renewing an MDR contract?
- What role does the customer play in ensuring MDR success — and what does effective collaboration look like?
Speaker: Jared Henderson
Founder, Falx Cyber Security (Teleport)
Speaker: Vivek Rao
Information Security Risk Specialist, Entercard Group AB
The Digital Operational Resilience Act (DORA) came into full effect on January 17, 2025, ushering in a new era of stringent cybersecurity and operational resilience requirements for financial institutions and their technology providers operating in the EU. So now what?
Non-compliance isn’t just risky—it has real regulatory and business consequences, including mandatory contract termination for non-compliant ICT vendors.
But achieving DORA compliance across today’s sprawling, complex infrastructure is no small feat. From on-prem data centers to cloud-native environments and dynamic DevOps pipelines, financial organizations and ICT providers alike face an uphill battle: securing every access point, ensuring continuous monitoring, and maintaining productivity without compromise.
- Eliminate credentials and standing privileges to reduce unauthorized access risks
- Implement dynamic, least-privilege access controls with short-lived certificates
- Gain real-time visibility, auditing, and automated incident response
- Support operational continuity while boosting developer productivity
- Align with DORA’s five-pillar ICT risk framework
Speaker: Naime Surenkok
Senior Sales Engineer & OWASP, Detectify
Today, security teams want to cover everything across their digital attack surface. But knowing what you’re exposing and what you should be scanning remains a challenge. You’re covering your core web apps, but if you were asked today, "What other apps should we be covering?" The answer is often, "I'm not sure." Why is that? Because always knowing the right targets to scan and why you should scan them is unlikely for any individual or even an entire security team. But does it have to be this way?
Join our table where we will tackle this challenge head-on with a hacker's mindset.
Questions we’ll cover:
- How does your organization select targets to scan?
- What are the factors you consider when selecting targets to scan?
- How do you work with vendors to help you figure out what to scan?
- How do you see these challenges evolving with AI tools becoming more involved in AppSec?
Folks who come to our table will get insights into:
- Why attackers don’t care about what you think is exposed, they care about the apps you miss. How diving into the signals – like the presence of JS libs, cookie consent, specific headers, or analytics, PII data – can reveal hidden web applications that you may not be aware of.
- How it’s possible to keep an eye on everything you’re exposing, all while knowing when you should be taking a closer look at an application that you didn’t know about that could be hacked. You can go from just knowing your top 10 apps to knowing everything.
Go Hack Yourself.
Speaker: Jon Neal
SVP & Field CTO, Saviynt
Speaker: Mehran Ahsant
IAM Manager Electrolux IAM and Global Security, Electrolux
As digital ecosystems grow, fragmented B2B connections creates security gaps, compliance risks, and poor user experiences. Siloed solutions lack scalability, interoperability, and trust across partners and suppliers.