INTEL Room

50 unique topics, 100+ expert speakers
join the discussion!

Innovation

Unveiling a Unique Approach to Cybersecurity.

The Grand Edition 2025 will feature 50 roundtable discussions, covering 50 unique topics organized under 6 critical focus areas for 2025, reflecting the latest challenges and opportunities in cybersecurity.

The discussions will be moderated by 100 industry experts and top-tier solution providers.

Power Players
0 +
Executives
0 +
Top Tier Vendors
0 +
Delve into our detailed agenda

Agenda

Please arrive early to secure your spot and ensure you don’t miss any important opening remarks.

"Venturing into the AI frontier: Unravelling the thrills and chills of cybersecurity's next big adventure!"

The way we choose to use AI is in our hands. For example, dynamite was originally invented by Nobel to assist in construction and mining, but over time it has also been misused for harmful purposes. In the same way, AI has the potential to greatly benefit us, and it should be harnessed to combat the threats posed by cybercriminals. What strategies CISOs must adopt to mitigate emerging risks. From adversarial attacks on AI models to the ethical implications of AI-driven decisions, this talk will delve into the most pressing issues security leaders face in today’s AI-driven world.

  •  Adversarial Threats and AI Exploitation
  • AI in Cyber Defense vs. AI in Cyber Offense
  • Ethics, Bias, and Trust in AI Systems

 

Keynote Speaker: Jelena Zelenović Matone, Senior Head, CISO, European Investment Bank

Keynote Speaker:

Mario Beccia

CIO, Nato

Akamai at the Orange Room

12:10 Making sure your business isn’t a “hole in one” for ransomware 

We must prepare ourselves for the worst, we must ask ourselves

  • "What if", not on a yearly review basis, but every day, what if we get ransomware? 
  • What if we do get extorted? What are the risks we are taking today? 
  • But most importantly, what's the cost? 

We can improve our baseline security and effectively lower our risk-taking by some rather simple, modern methods.

Speaker: Philip Wiberg, Senior Solutions Engineer, AKAMAI

Accenture at the Purple Room

12:10 The AI Cyber Threat Landscape: What’s Coming Next?

As AI technology advances, so do the methods cybercriminals use to exploit it. Content We will introduce and showcase real-time demonstrations of AI-powered attack techniques (deepfake manipulation, AI-created phishing campaigns and fraudulent websites, AI developer tool injections)

Speaker: Yacine Zaitri Accenture

Akamai at the Orange Room

12:10 Making sure your business isn’t a “hole in one” for ransomware 

We must prepare ourselves for the worst, we must ask ourselves

  • "What if", not on a yearly review basis, but every day, what if we get ransomware? 
  • What if we do get extorted? What are the risks we are taking today? 
  • But most importantly, what's the cost? 

We can improve our baseline security and effectively lower our risk-taking by some rather simple, modern methods.

Speaker: Philip Wiberg, Senior Solutions Engineer, AKAMAI

Accenture at the Purple Room

12:10 The AI Cyber Threat Landscape: What’s Coming Next?

As AI technology advances, so do the methods cybercriminals use to exploit it. Content We will introduce and showcase real-time demonstrations of AI-powered attack techniques (deepfake manipulation, AI-created phishing campaigns and fraudulent websites, AI developer tool injections)

Speaker: Yacine Zaitri Accenture

Are we ready for the next frontier when it comes to Quantum Computing and Cybersecurity?

As quantum computing advancements accelerate, the risks to classical encryption grow.

How should CISOs and security leaders prepare? Let’s hear from the experts and ask critical questions. 

  • How quantum computing threatens current cryptographic protocols like RSA and ECC? 
  • Could you shed light on post-quantum cryptography and its role in safeguarding digital assets?
  • Share best practices for CISOs to future-proof their security frameworks

Speaker: Deepak Subramanian, Chief Information Security Officer,  Energy One Limited 

Speaker: Dr. Tim Nedyalkov, Former TISO, Commonwealth Bank of Australia

Language Models Under Fire: Security Challenges and Defense Tactics in the Age of Generative AI

Language models (LMs) are transforming industries, but they also introduce distinct security challenges that demand new approaches. This keynote highlights the most pressing risks: from passive and active data leaks, to adversarial attacks like prompt injection and input poisoning, and the emerging threats posed by autonomous models.

I will share real-world examples and mitigation strategies, along with model risk evaluation techniques to improve resilience.

Looking ahead, I’ll review how autonomous models may escalate risks through self-directed behavior and complex interactions, requiring proactive defenses.

  • Awareness of language model-specific security vulnerabilities
  • Overview of practical mitigation tactics
  • Insight into future threats from increasingly autonomous AI
  • A strategic outlook for securing generative AI systems

Keynote Speaker: Nir Chervoni, Head of Data Security, Booking.com 

By invitation only

Learn directly from our expert speakers. This exclusive event offers a unique opportunity to network with C-suite Power Players, whilst enjoying fine dining and entertainment in a spectacular setting. Don't miss out on this exceptional opportunity!

Are you reporting on Meaningful Risk or Vanity Metrics? 

Traditional vulnerability management programs measuring how many CVEs are patched after 30-60-90 days will tell you that your team worked really hard to apply patches to the vulnerabilities that can be fixed, but will fail to tell you how much risk you actually reduced and what is the criticality of those exposures that you didn't fix. To report on meaningful risk you need to adopt metrics that will convey the risk to your business critical assets, the time it takes to discover and prioritize critical exposures in your environment, and the mean time to resolution (MTTR). Join the session to learn more about ways to upgrade your reporting metrics

Speaker: Dan Anconina, CISO, XM Cyber

99%

Satisfied Delegates

Join us as we navigate the future of cybersecurity together.

CONTRIBUTORS

Insights from inspiring Keynotes and leading industry Experts.

Under the patronage of

Sir Malcolm Larri

Chairman
Thomas Zuliani

Global CISO,
ARLA Foods

Jelena Zelenović Matone

Ciso of the Year, European Investment Bank

David
Jacoby

Pwn Star

Dr. Tim Nedyalkov

Former TISO, Commonwealth Bank of Australia

Deepak
Subramanian

Group CISO, EnergyOne

Jon
Neal

SVP & Field CTO, Saviynt

Dan Anconina

CISO, XM Cyber

Philip Wiberg

Senior Solutions Engineer, AKAMAI

Yacine Zaitri

Accenture

Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Smeden Svahn

CISO, Adda

Trish McGil

Chief Cyber Security Strategist ,De Heus Voeders

Jan Öhman

Information Security Evangelist

Sanjay Kumar

Threat Intelligence Manager, Landis+Gyr

Christian Hedström

CISO, QD Sverige AB

Anders Jared

CISO, Bravida

Nithin Krishna

Head of Cyber Security, Jeppesen

Lars Ponten

Cybersecurity Evangelist

Prof. Shahid Raza

Professor, University of Glasgow, UK

Daniela Almeida Lourenço

Global CISO, Hunkemöller

Björn Johren

CISO, Max Matthiessen AB

Surinder Lall

Former SVP Global Information Security Risk Management

Giovanni Söderman

Vice President Global IT, Consilium Safety Group

Martin Vallee

CISO,CSO & Head of DevOps, Eyeon Group

Shahmeer Amir

Ethical Hacker

Thomas Evertsson

Head of IT, Swedish Film Institute

Teresia Willstedt

ISO, MedMera Bank

Dag Friden

Chief Information Security Officer, Aros Kapital

Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller

Thea Sogenbits

CISO, Estonian Tax and Customs Board

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

Georgios Kryparos

CISO, Einride

Johan Nordin

Director of IT & IS, Extenda Retail

Thomas Warneryd

CISO,Scandi Standard

Adnan Jamil

CTO, Frank Penny

Elnaz Tadayon

Cybersecurity Manager, H&M

Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

Thom Langford

EMEA CTO, Rapid7

Tom Kjølhamar

Leder for IT-sikkerhet, Moelven Industrier Censys

Bala Periasamy

Nordic Product Industry Security Lead, Accenture

Hugo Sigurdson

Security Engineer, CrowdStrike

Kouadio Simon N'zué

Aircraft System Engineering, Airbus

Jan Olsson

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Gareth O'Sullivan

Lead Trust & Security Engineer for EMEA, Bugcrowd

Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Peter Hampus

CIO, Nackademin

Jaens Stafren

Account Executive EMEA, Keeper

Stephen McDermid

Regional CSO, EMEA, OKTA

Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Christian Reinhardt

Director Human Risk Management, SoSafe

Russ Bentley

Executive Vice President Product Marketing, Zerofox

Akhilesh Mandowara

Executive consultant, EMEA Practice Leader – Cloud & Infrastructure Security, IBM Cybersecurity Services

Johnny Krogsboll

Technical Security Leader, Palo Alto Networks Sweden

Peter Lundell

Public Sector Account Manager, Elastic

Santhosh Jayaprakash

Founder & CEO, Unosecur

Boaz Barzel

Field CTO, OX Security

Dirk-Jan van Helmond

Director, Solutions Engineering, Cloudflare

Stefan Lager

CTO Services, Sciber

Jared Henderson

Founder, Falx Cyber Security (Teleport)

Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec

Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Sayantan Dey

Legal Counsel / Compliance Officer/ Risk Management Expertise, Sandvik

Predrag Gaic

Chief Information Security Officer, Viedoc

Richard Rosengren

Territory Sales Manager, Thales

Sharon Larsson

CISO, Svenska Spel

Rolf Lindby

CIO, Bulls Press

Anders Thingholm

CIO, Bulls Press

Martin Karlsson

CISO, AP3

Per Gustavsson

CISO, Stratsys

Thomas Norlin

Senior Enterprise Sales Executive, Akamai

Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

Naime Surenkok

Senior Sales Engineer & OWASP, Detectify

Lydia Meneses

(CISA) | SOC Manager,OKQ8

James Johnson

Regional Sales Director, Northern Europe & Middle East, Bitdefender

Steven Duckaert

EMEA pre-sales team, Upwind

Marcin Zimny

Senior Principal Solution Architect, Ping Identity

Naz Bozdemir

Product Marketing Lead, HackerOne

Mehran Ahsant

IAM Manager Electrolux IAM and Global Security, Electrolux

Many More Power Players to Come

SEE ALL UNIQUE TOPICS

Round Table Discussion

Speaker: Giovanni Söderman

Vice President Global IT, Consilium Safety Group

As the Cyber Resilience Act (CRA) mandates organisations to bolster their cybersecurity frameworks, many are grappling with significant budget and resource constraints. The challenges of aligning with CRA requirements while operating under financial and personnel limitations needs to be discussed. Practical strategies need to take place for prioritising cybersecurity investments, optimising existing resources, and advocating for increased funding in an era where cyber threats are escalating.

  • Balancing Compliance and Budget: Exploring cost-effective measures and prioritisation strategies to meet CRA requirements without overextending limited budgets.
  • Resource Optimization: Identifying and leveraging existing tools, technologies, and human resources to maximise cybersecurity resilience despite staffing or technological shortages.
  • Advocating for Cybersecurity Funding: Tactics for building a compelling case to stakeholders and leadership for increased investment in cybersecurity, focusing on the long-term risks of underfunding.

Speaker: Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Speaker: Peter Lundell

Public Sector Account Manager, Elastic

The digital landscape is evolving rapidly, and with it, the nature of cyber threats is becoming more sophisticated. As Artificial Intelligence (AI) continues to transform industries, it is also being harnessed by malicious actors to conduct more effective, intelligent, and automated cyber-attacks. These AI-powered attacks pose a significant challenge to organisations, as traditional security measures are often insufficient to detect and mitigate these advanced threats.We will delve into the growing trend of AI-driven cyber threats, explore the tactics used by attackers, and discuss how businesses can adopt AI-enhanced cybersecurity solutions to stay ahead of the curve.

  • Understanding the AI Threat Landscape
  • Why Traditional Cybersecurity Falls Short?
  • Leveraging AI for Cyber Defense

Speaker: Martin Karlsson

 CISO, AP3

Speaker: Dirk-Jan van Helmond

 Director, Solutions Engineering, Cloudflare

As we stand on the cusp of a new technological era, businesses must navigate a landscape that is constantly evolving. Emerging technologies like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) are not just buzzwords; they are powerful tools that can drive innovation, streamline operations, and create new opportunities for growth. We will explore how companies can strategically leverage these technologies to stay competitive and foster sustainable growth. By understanding the impact and potential of these advancements, businesses can not only keep pace with change but also lead it.

  • Unlocking the Power of AI and Machine Learning: How AI can transform business operations through automation, predictive analytics, and personalised customer experiences? 
  • Case studies of companies successfully implementing emerging technologies such as AI, Blockchain and IoT to improve decision-making and reduce costs.
  • Best practices for integrating emerging tech into existing business models to drive innovation and efficiency.

Speaker: Smeden Svahn

CISO, Adda

As the Nordics experience a surge in phishing attacks targeting businesses and consumers, we must play a proactive role in safeguarding digital ecosystems. Cybercriminals are using increasingly sophisticated methods to exploit vulnerabilities, making it imperative for service providers, software vendors, and cybersecurity firms to enhance their defence strategies. 

  • Evolving Phishing Tactics in the Nordics
  • Impact on Critical Sectors
  • Countermeasures and Best Practices 

Speaker: Lydia Meneses

 (CISA) | SOC Manager,OKQ8

Speaker: Stephen McDermid

Regional CSO, EMEA, OKTA

In today’s interconnected and globalised world, the security of supply chains has become more critical than ever. Disruptions, ranging from cyberattacks to geopolitical tensions, have highlighted the vulnerabilities that can cripple businesses. We will explore the importance of supply chain resilience, focusing on how companies can fortify their end-to-end processes. By implementing advanced security measures, developing flexible risk management strategies, and leveraging technology, organisations can create robust and adaptive supply chains that withstand challenges and drive sustained growth.

  • Integrating Cybersecurity in the Supply Chain
  • Building Flexible and Agile Risk Management
  • Collaborating with Partners for Holistic Security

Speaker: Jan Öhman

Information Security Evangelist (Former CISO of Elisa Polystar)

Speaker: James Johnson

Regional Sales Director, Northern Europe & Middle East, Bitdefender
  • Why automate? Understanding the effects of good (and bad) automation in IT Security
  • Closing the skills gap leveraging technology
  • Continuously identifying & reducing the attack surface

Speaker: Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Speaker: Georgios Kryparos

CISO, Einride

In a world where cyber threats are evolving at an unprecedented pace, the traditional perimeter-based security models are no longer sufficient. Zero-Trust Architecture (ZTA) offers a transformative approach to modern security, shifting the focus from trusted networks to continuous verification of every user, device, and connection. How Zero-Trust is redefining the digital landscape, ensuring that security is embedded in every layer of access control, data exchange, and operational integrity? It’s a call for organisations to adopt a proactive defence mechanism in an increasingly borderless digital environment.

  • Trust no one, verify everything: The shift from perimeter security. How does ZTA enforces the principle of “never trust, always verify,” ensuring each access request is authenticated and authorised regardless of location?
  • How does Zero-Trust dynamically adapt to changing threat landscapes by constantly validating credentials and access points?
  • Step-by-step guidance on implementing Zero-Trust across network infrastructure, including identity verification, least privilege access, and micro-segmentation.

Speaker:  Kouadio Simon N'zué

 Aircraft System Engineering, Airbus

As the global adoption of 5G technology accelerates, it promises faster speeds, reduced latency, and increased connectivity across industries. However, with these advancements come new cybersecurity challenges. The vulnerabilities inherent in 5G networks and discuss strategies for safeguarding the future of connectivity. By addressing these risks, we can ensure the secure deployment and operation of 5G, which is critical for supporting next-generation applications like autonomous vehicles, IoT, and smart cities.

  • How 5G’s use of virtualization and network slicing opens new avenues for cyber threats?  
  • What are the risks associated with compromised software, hardware backdoors, and potential state-sponsored espionage?
  • Mitigating Risks in IoT and Critical Infrastructure.

Speaker: Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

Speaker: Steven Duckaert

EMEA pre-sales team, Upwind

Are you tired of dealing with misconfigurations in cloud infrastructure? Introducing the Innovator session!

Gain unparalleled insights from industry leaders who have revolutionised cloud security. Discover cutting-edge strategies and innovative solutions that will empower you to tackle challenges head-on.

Join the session and take control of your cloud security journey. Together, we can build a safer digital landscape.

Speaker: Jan Olsson

Police Superintendent ~ Årets Säkerhetsprofil 2022, Polismyndigheten Swedish Cybercrime Center SC3

Speaker: Christian Reinhardt

Director Human Risk Management, SoSafe

In our increasingly connected world, cybersecurity is more important than ever. But too often, organisations and individuals become complacent after initial safeguards are in place. Cyber threats are constantly evolving, and so should our awareness and responses. We will dive into why cyber awareness must be an ongoing effort, not a one-time action, and how continuous vigilance can protect us from unseen dangers in the digital realm.

  • “The Cyber Threat Never Sleeps”: Understand how cybercriminals continuously develop new tactics and why static defences won’t suffice.
  • “Human Error: The #1 Cyber Vulnerability”: Learn why ongoing training and awareness are key to minimising the most common cybersecurity weakness—us.
  • “Stay One Step Ahead”: Explore the latest trends in cybersecurity to understand why proactive measures and up-to-date security strategies are the foundation of long-term protection.

Speaker: Christian Hedström

CISO, QD Sverige

Speaker: Thom Langford

EMEA CTO, Rapid7

Cybersecurity is no longer just an IT issue—it’s a business imperative. However, a gap often exists between the technical insights of CISOs and the strategic priorities of the management board. We will explore how organisations can build stronger bridges of communication and collaboration between these two crucial groups. By fostering mutual understanding, businesses can not only enhance their cyber resilience but also turn cybersecurity into a competitive advantage.

  • Speak the Same Language: Translating Tech to Business Impact
  • Cybersecurity as a Strategic Asset: Making Cyber a Boardroom Priority
  • Bridging the Cultural Divide: Building Trust Between CISOs and Executives

Speaker: Anders Jared

CISO, Bravida

Speaker: Gareth O'Sullivan

 Lead Trust & Security Engineer for EMEA, Bugcrowd

As the EU prepares to enforce its groundbreaking AI regulations, industries across the globe are left grappling with what compliance means in practice. The new EU AI Act sets ambitious standards for AI systems, aiming to balance innovation with ethical oversight.Let’s dive into the implications of these regulations, exploring how businesses can adapt, what loopholes still exist, and whether this new legal framework will truly tame the AI revolution or leave it in chaos.

  • What are the key compliance challenges, and how can organisations ensure they align with these new rules while fostering innovation?
  • Will the AI Act stifle creativity, or does it create new opportunities for ethical AI development?
  • How will this regulation impact global AI development and adoption, and what does it mean for non-EU companies looking to do business in Europe?

Speaker: Nithin Krishna

Head of Cyber Security, Jeppesen

Speaker: Santhosh Jayaprakash

 Founder & CEO, Unosecur

While the advantages and drawbacks of Zero Trust solutions have been widely debated, the greatest challenge lies in shifting the mindset of users. Educating individuals on adopting the Zero Trust approach is far more crucial than merely deploying the technology itself. The success of Zero Trust strategies hinges on effectively translating the concept into tangible business value.

  • The Future of Zero Trust with Advanced Technologies and AI: As technology evolves, particularly with advancements in artificial intelligence, the Zero Trust framework will continue to evolve. AI will play a pivotal role in enhancing security through dynamic, real-time verification processes, automating threat detection, and responding to potential risks in a smarter, more adaptive manner.
  • What Does “Always Verify, Never Trust” Mean? At the core of Zero Trust is the principle that no entity, whether inside or outside the network, should ever be trusted by default. Every access attempt must be continuously verified. This proactive stance ensures that the network remains secure, requiring constant authentication and validation of users, devices, and data before granting access.
  • Zero Trust in the Cybersecurity Landscape: In cybersecurity, the Zero Trust model marks a paradigm shift from traditional perimeter-based defences. Instead of assuming that entities within the network are safe, Zero Trust operates under the assumption that threats can exist both inside and outside. This approach minimises risk by enforcing strict access controls, continuous monitoring, and verification at every step, ensuring a more resilient and secure environment.

Speaker: Lars Ponten

Cybersecurity Evangelist

Speaker: Sharon Larsson

 CISO, Svenska Spel

In the age of artificial intelligence, businesses and individuals are more connected—and more vulnerable—than ever before. While AI offers groundbreaking innovations, it also opens the door to new cyber threats. As technology evolves, so must our cybersecurity practices. How good cyber hygiene and compliance protocols are essential for safeguarding sensitive data, maintaining trust, and staying ahead of evolving threats? Join us to discover how combining traditional cybersecurity measures with AI-driven solutions can create an unbreakable digital fortress.

  • “Smart Defences for Smart Attacks”: Learn how AI is transforming both sides of the cybersecurity landscape—making attackers more sophisticated and defences more dynamic. Understand the importance of proactive cyber hygiene practices to stay one step ahead of AI-powered threats.
  • “Compliance in the Age of Automation”: Explore the evolving regulatory landscape, from GDPR to CCPA, and how businesses must adapt compliance measures to meet the challenges of automated data processing and AI integration.
  • “AI + Human Vigilance = A Clean, Safe Digital Space”: Discover why AI alone is not a silver bullet and how fostering a culture of cyber hygiene—where human vigilance complements AI-driven defences—is key to long-term cybersecurity success.

Speaker: Prof. Shahid Raza

Professor of Cybersecurity, University of Glasgow, UK

As we race into the 2025 and beyond, the next generation of communication, 6G, promises to natively integrate terrestrial networks with non-terrestrial networks, namely satellite, drones, planes, in addition to promising revolutionary advancements in speed and connectivity. However, this rapid evolution can bring a new set of vulnerabilities that could jeopardise our digital infrastructure. Join us as we dive into the emerging risks and strategies to safeguard our hyper-connected future. Explore the novel attack vectors and security challenges unique to 6G technology.

  • Explore the novel attack vectors and security challenges unique to 6G technology.
  • Analyse case studies and potential consequences of 5G network breaches on businesses and everyday life. 
  • Learn about cutting-edge security measures and proactive strategies being developed to protect the 6G ecosystem from future threats.

Speaker: Sanjay Kumar

PhD, Cybersecurity | Threat Intelligence Manager, Landis+Gyr

Speaker: Rolf Lindby

CIO, Bulls Press

In this riveting session, we dive into the high-stakes world of ransomware attacks that have rocked Europe. From multi-million-dollar ransom demands to critical infrastructure disruptions, this case study sheds light on how various European countries have been fighting back against these relentless cyber threats. Discover the strategies, lessons learned, and innovative solutions that are shaping Europe’s cybersecurity landscape.

  • The Ransomware Rising: A European overview
  • Strengthening the frontlines: Europe’s defence strategies
  • Lessons from the Battlefield: Building a resilient future.

Speaker: Daniela Almeida Lourenço

Global CISO, Hunkemöller

Teresia Willstedt

ISO, MedMera Bank

Phishing simulations are crucial for maintaining a security edge. Currently, phishing your own users is just as vital as implementing cutting-edge cybersecurity solutions. Without training your team to remain vigilant, how can you ensure protection against phishing attacks?

  • The increase of phishing attacks due to advanced technologies. 
  • Strategies for conducting sophisticated awareness programs for users. 
  • Methods for staying ahead of emerging threats.

Speaker: Trish McGil

Chief Cyber Security Strategist | Executive Subject Matter Expert Cyber Security, De Heus Voeders

In an era where cyber threats are evolving at an unprecedented rate, it’s crucial to stay ahead of the curve. Join us as we delve into the latest innovations in cybersecurity that are set to revolutionise the way we protect our digital realms. From AI-driven threat detection to quantum encryption, this will showcase how emerging technologies are shaping the future of cyber defence.

  • AI Revolution: Explore how artificial intelligence is revolutionising industries from healthcare to entertainment, and what ethical considerations come with its rapid advancement.
  • Quantum Leap: Get a glimpse into the world of quantum computing, where the limits of classical computing are challenged, and see how this technology might solve complex problems faster than ever before.
  • Sustainable Tech: Discover the latest in green technologies and sustainable practices, and learn how emerging innovations are working towards a more eco-friendly and energy-efficient future.

Speaker: Anders Thingholm

 Head of Information Security, DANX Carousel

With NIS2 enforcement reshaping expectations across sectors, Business Continuity Planning has become a strategic imperative. But what does real-world BCP implementation look like? This roundtable explores how organizations can move from static documents to dynamic resilience strategies that work under pressure.

  • Why BCP is a core pillar of NIS2—and how to approach it differently from traditional crisis management
  • Practical steps for designing, implementing, and testing a living BCP framework
  • Turning continuity planning into business value: reducing downtime, increasing stakeholder trust, and supporting faster recovery
  • Peer insights: what’s working, what’s not, and where to begin if you’re starting from scratch

Speaker:  Adnan Jamil

CTO, Frank Penny

Organisations across various industries have embraced cloud computing to simplify their operations and enjoy its technological benefits. However, this transition is not without its challenges. In fact, it introduces significant concerns, as companies struggle to safeguard their cloud environments from prevalent security threats. Issues such as limited visibility and control over cloud infrastructure, unauthorised access, and external data sharing pose ongoing difficulties.

  • Cloud Security Threats: 2025 and Beyond
  • Regulatory Compliance: Is It Beneficial for Cloud Security?
  • Strategies for Protecting Your Cloud Environment

Speaker: Adnan Jamil

CTO, Frank Penny

Speaker: Hugo Sigurdson

Security Engineer, CrowdStrike

As artificial intelligence continues to evolve and integrate into various sectors, its potential to revolutionise cybersecurity is accompanied by new and unprecedented threats. We will explore the dark side of AI, revealing how malicious actors are harnessing its power to orchestrate sophisticated cyber attacks. Attendees will gain insights into the emerging trends in AI-driven cyber threats, understand the vulnerabilities that are being exploited, and learn proactive strategies to defend against this high-tech menace.

  • The Rise of AI-Powered Cyber Weapons: Uncover how AI is being used to automate and enhance cyber attacks, from deepfakes to autonomous hacking tools.
  • Identifying Vulnerabilities in the Age of AI: Learn about the new security challenges posed by AI and how traditional defences are being outpaced by smart, adaptive threats.
  • Strategies for Resilience and Defense: Discover cutting-edge techniques and best practices for leveraging AI in your own cybersecurity efforts to stay one step ahead of the attackers.

Speaker: Per Gustavsson

CISO, Stratsys

Speaker: Thomas Norlin

Senior Enterprise Sales Executive, Akamai

Zero Trust is a forward-thinking cybersecurity approach that abandons the outdated perimeter-based security mindset. It assumes that no user or device—inside or outside an organization’s network—should be trusted by default. As remote work, cloud adoption, and advanced cyber threats become the norm, Zero Trust delivers a resilient strategy for reducing risk, managing access, and validating identity at every step. Its guiding principle is simple: trust nothing, verify everything.

  • Continuous verification: Every access request is fully authenticated, authorized, and encrypted, regardless of origin or location.
  • Least privilege access: Limit access strictly to what users and devices need, minimizing potential damage from compromised accounts or systems.
  • Assume breach mentality: Zero Trust operates under the assumption that breaches will occur, focusing on containment, visibility, and rapid response rather than only prevention. 

Speaker: Dr. Tim Nedyalkov

 Former TISO, Commonwealth Bank of Australia

Quantum computing is no longer science fiction—it’s fast becoming a revolutionary technology with the potential to reshape industries, crack previously unsolvable problems, and drive innovation. But with great power comes great responsibility. While quantum computers promise breakthroughs in fields like medicine, finance, and artificial intelligence, they also pose existential risks to cybersecurity and could widen the digital divide. In this session, we will explore the promise and peril of quantum computing, and whether it will lead us to a brighter future or usher in unforeseen challenges. Is it the blessing we’ve been waiting for, or could it become a curse in disguise?

  • The quantum leap: Breakthroughs and opportunities

 Quantum computing’s immense power can revolutionise sectors such as drug discovery, climate modelling, and artificial intelligence by solving complex problems that today’s supercomputers struggle with.

  • Security: Savior or Saboteur? 

While quantum computers could improve cryptography and enhance security systems, they also threaten to break the encryption methods that protect global financial systems, military secrets, and personal data.

  • Widening the Tech Gap: Who Wins, Who Loses? 

As quantum technology matures, the digital divide between countries and corporations may widen. Those who can harness its power will gain immense advantages, leaving others behind and potentially reshaping the geopolitical landscape.

Speaker: Björn Johren

CISO, Max Matthiessen AB

Ransomware attacks have rapidly evolved into one of the most severe and pervasive cybersecurity threats, targeting businesses, governments, and individuals alike. The sophistication of these attacks has escalated, often resulting in catastrophic financial and operational impacts. The current state of ransomware, exploring recent high-profile cases, emerging trends, and the critical strategies needed to defend against this growing menace and business processes. How can this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture?

  • The Rise of Double and Triple Extortion Tactics
  • The Role of Ransomware-as-a-Service (RaaS)
  • Strategies for Building Resilience and Response

Speaker: Martin Vallee

CISO,CSO & Head od DevOps, Eyeonid

Speaker: Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

As more organisations migrate to cloud-based environments, they find themselves facing a new set of cybersecurity challenges. While the cloud promises scalability, flexibility, and cost savings, it also brings its own stormy skies. The biggest cybersecurity challenges cloud users face today: Cloud Compliance, Lack of Skills, Identity and Access Management (IAM), and Shadow IT. Join our experts as they discuss these pressing issues and provide actionable insights on how to secure your cloud journey and weather any cybersecurity storm that comes your way.

  • Cloud Compliance
  • Lack of Skills
  • Identity and Access Management (IAM)
  • Shadow IT

Speaker: Thomas Warneryd

CISO, Scandi Standard

Speaker: Richard Rosengren

Territory Sales Manager, Thales

A major challenge many businesses face in cloud environments is the limited control and visibility over their systems and data. It’s essential to maintain full oversight of your cloud infrastructure to ensure data security and smooth operations. Without proper control and visibility, your organisation becomes vulnerable to data breaches, leaks, or even encryption attacks. 

Thankfully, there are security solutions available to help mitigate these risks.

Speaker: Shahmeer Amir

Ethical Hacker

As we transition into the 5G era, the enhanced speed and widespread availability bring unprecedented opportunities but also broaden the attack surface for cyber threats. However, solutions are available to secure and monitor 5G network traffic, safeguarding against unauthorised access and data breaches.

Speaker: Johan Nordin

 Director of IT & IS, Extenda Retail

Join our exclusive session on Supply Chain Attacks, tailored for professionals looking to deepen their knowledge of software supply chain vulnerabilities. Explore the complexities of these threats and learn strategies to protect your organisation from the risks posed by malicious actors. Gain valuable insights into identifying weaknesses within your supply chain and strengthening your defences to prevent breaches that could endanger critical systems and sensitive data. Don’t miss this opportunity to enhance your expertise and secure your digital assets.

Speaker: Rolf Lindby

CIO, Bulls Press

Are you ready for the next wave of ransomware attacks? Join us for an eye-opening session that uncovers the dark progression of triple extortion. Imagine this: hackers breach a system, unleashing ransomware, but they don’t stop there. Before encrypting the data and locking out the victim, they steal sensitive information. Then, they push the extortion further by threatening the victim’s business partners and associates with a data leak, aiming to extract even more money. In this session, you’ll gain the tools and insights to defend your organisation against this escalating threat and protect your critical data from malicious attacks.

Speaker: Thomas Evertsson

Head of IT, Swedish Film Institute

Speaker: Akhilesh Mandowara

Executive consultant, EMEA Practice Leader – Cloud &            Infrastructure Security, IBM Cybersecurity Services

Speaker: Johnny Krogsboll

Technical Security Leader, Palo Alto Networks Sweden

As artificial intelligence transforms industries and powers innovation, it also opens the door to unforeseen threats. The same algorithms that drive progress can be weaponized for malicious purposes, making it essential for businesses and individuals to understand and address the risks. This presentation will highlight the growing dangers of AI-related threats, from data manipulation to deep fakes, and explore how to stay ahead of these evolving challenges.

  • Deep fake Deception
  • AI-Driven Cyber Attacks
  • Ethical AI Dilemmas

Speaker: Teresia Willstedt

ISO, MedMera Bank

In today’s digital landscape, phishing attacks are more common than ever, often disguised as legitimate communications. This presentation will unravel the mysteries behind these deceptive schemes, helping you spot the fakes and protect your valuable information. Join us for a deep dive into the world of phishing and learn how to defend yourself from these cunning cyber threats.

  • Spotting the Hook
  • Reeling in the Scammers
  • Safety Net Strategies

Speaker: Naz Bozdemir

 Product Marketing Lead, HackerOne

Speaker: Smeden Svahn

 CISO, Adda

Is cybersecurity a cost center or a profit protector? For too long, security leaders have struggled to justify their budgets in terms boards and business leaders can understand. It’s time to shift the conversation. This session introduces Return on Mitigation (RoM), a framework designed to quantify the financial impact of mitigated breaches, enabling leaders to position cybersecurity as a critical investment that enables business priorities.

In this session, you'll discover how to:

  • Use the RoM calculator, built on widely accepted industry benchmarks like IBM’s Cost of a Data Breach Report
  • Automate RoM calculations and generate real-time summaries tailored to your organization’s business and risk profile.
  • Make data-driven business cases to your board and executive team, showing why offensive security programs are essential to operational continuity, brand protection, and long-term profitability.

Speaker: Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Speaker: Marcin Zimny

Senior Principal Solution Architect, Ping Identity

Digital landscape, traditional security models are no longer sufficient to protect against sophisticated cyber threats. Enter Zero-Trust Security—a groundbreaking approach that operates on the principle of never trusting, always verifying. This presentation will explore how Zero-Trust can revolutionise your security strategy, providing a robust framework that anticipates and mitigates threats before they can compromise your systems.

  • Uncompromising Security
  • Enhanced Risk Management
  • Seamless Integration

Speaker: Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Speaker: Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

This presentation will explore how emerging technologies are reshaping the security landscape, presenting both new opportunities and challenges. We’ll delve into the latest advancements, from AI-driven security measures to quantum encryption, and discuss their implications for safeguarding digital assets. Discover how these innovations are revolutionising the way we protect our information and what steps you can take to stay ahead of cyber threats.

  • AI and Machine Learning in Cyber Defense
  • Quantum Encryption: The Future of Secure Communication
  • The rise of decentralised security

Speaker: Dag Friden

Chief Information Security Officer, Aros Kapital

Speaker: Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec
  • Evolving Threats: Cyber threats are constantly changing. Staying updated on the latest risks ensures your defences remain effective and your data stays protected.
  • Ongoing Education: Regular training keeps your team informed about best practices, empowering them to recognize and respond to potential threats swiftly.
  • Adaptive Strategies: Continuous awareness helps in refining security policies and practices, ensuring they adapt to new vulnerabilities and attack vectors.

Speaker: Anupama Jaiswal

Information Security Specialist, Truecaller
  • Understanding the Threat Landscape: Learn about the increasing risks associated with third-party vendors and partners, including data breaches and cyber-attacks, and how they can impact your organisation.
  • Effective Risk Management Strategies: Discover actionable strategies to assess and mitigate third-party risks, from due diligence to continuous monitoring, ensuring your cybersecurity measures extend beyond your direct control.
  • Building Resilient Partnerships: Gain insights on fostering secure and trustworthy relationships with third parties, including best practices for contracts, compliance, and regular audits to fortify your overall cybersecurity posture.

Speaker:  Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller
  • Unseen Risks: Learn how insider threats can quietly compromise your data and systems from within, often without detection until it’s too late.
  • Detection and Prevention: Explore cutting-edge techniques and tools designed to identify suspicious behaviour early and prevent potential breaches.
  • Real-World Case Studies: Discover lessons from recent insider threat incidents and how businesses like yours can bolster defences against these internal risks.

Speaker: Thea Sogenbits

CISO, Estonian Tax and Customs Board
  • Targeted Precision: Explore how state-sponsored attacks are strategically designed to exploit specific vulnerabilities in national infrastructure, corporate systems, and critical technologies. 
  • Advanced Techniques: Discover the cutting-edge methods employed by nation-states to conduct cyber espionage, from sophisticated malware to zero-day exploits.
  • Global Implications: Understand the far-reaching consequences of state-sponsored cyberattacks, including geopolitical tensions, economic impact, and the need for international

Speaker: Roger Olmås

CISO, Rusta
  • Phishing Phantoms: Learn how attackers use deceptive emails and websites to steal your confidential information. Spot the red flags before they hook you! 
  • Pretexting Perils: Discover how cybercriminals craft convincing stories to manipulate you into revealing personal details or giving away access. Stay one step ahead with our insider tips!
  • Baiting Blunders: Understand the tactics behind fake offers or tempting downloads designed to lure you into compromising your security. Guard against these traps with our expert advice!

Speaker: Elnaz Tadayon

Cybersecurity Manager,  H&M

Speaker: Bala Periasamy

Nordic Product Industry Security Lead, Accenture

In today’s interconnected economy, technology-driven supply chains enable the seamless flow of goods across borders. However, this reliance on digital systems also exposes these global networks to significant risks from cybercriminals and other malicious actors. To safeguard uninterrupted operations, implementing comprehensive, end-to-end security measures is no longer optional but essential. 

  • Cyber Vulnerabilities: Increasing dependence on technology makes supply chains prime targets for cyberattacks, threatening disruptions in critical sectors. 
  • Need for Comprehensive Security: Robust, multi-layered defences are crucial to detect, prevent, and respond to potential cyber threats throughout the supply chain. 
  • Impact on Global Economies: Disruptions in supply chains due to cyber incidents can have ripple effects, impacting global trade and economic stability. 

Speaker: Peter Hampus

CIO, Nackademin

Speaker: Jaens Stafren

Account Executive EMEA, Keeper

The best way to adjust your Privileged Access Management (PAM) strategy for growth is to choose a modern PAM solution that scales with your organisation. You may face many challenges when adjusting your PAM strategy as your organisation grows, including more complex infrastructure, a higher number of login credentials to manage and increased security risks, so you need to have a flexible PAM solution. Attend this round table session to learn more about the challenges your organisation may face when adjusting its PAM strategy and why you should choose a PAM strategy that grows with you. 

  • What are the challenges in adjusting your PAM strategy as you grow 
  • Keeping up with compliance requirements 
  • How to choose a PAM solution that grows with you

Speaker: Russ Bentley

Executive Vice President Product Marketing, Zerofox

Learn how attackers exploit the digital footprint of business leaders and what can be done to mitigate these risks. 

Synopsis: Europe's cyber threats have intensified in 2024, with sophisticated attacks targeting executives to breach enterprise networks. Social engineering, ransomware, and access broker markets pose significant dangers. 

We will explore how to identify exposed information, understand potential exploitation methods, and implement effective mitigations. With limited resources and active dark web threats, organizations need strategic threat intelligence to defend against malicious actors in this rapidly evolving landscape. 

  • Learn how to proactively identify your exposed information before attackers find it 
  • Understand how cybercriminals leverage compromised information against executives and organizations 
  • Discover practical mitigation strategies for the evolving European cyber threat landscape
  • Gain strategic approaches to threat intelligence that maximize limited security resources
  • Get insights into dark web actor methodologies, including social engineering tactics, ransomware operations, and initial access broker marketplaces 

Speaker: Boaz Barzel

Field CTO, OX Security

Speaker: Predrag Gaic

 Chief Information Security Officer, Viedoc

Security leaders are expected to do it all—but where should CISOs really focus when it comes to Application Security? Join us for a high-impact session where we cut through the noise and break down what truly matters in AppSec. Discover strategic insights, actionable frameworks, and real-world approaches to making AppSec manageable—without the overwhelm.

  • Clarify your role in AppSec to drive real security outcomes
  • Overcome common roadblocks and avoid wasted efforts
  • Learn from industry experts on how to balance security, speed, and innovation

Speaker: Stefan Lager

 CTO Services, Sciber

Speaker: Sayantan Dey

Compliance Officer/ Risk Management Expert, Sandvik

As cyber threats grow increasingly sophisticated and stealthy, MDR has emerged as a preferred solution for organizations seeking 24x7 threat detection and incident response. However, not all MDR services are created equal; some fail to provide real, actionable outcomes and improvement.

 

This roundtable will explore the reality behind MDR offerings, what’s working, what’s marketing fluff, and how organizations can cut through the noise to find actual value. We’ll also explore how to evaluate MDR effectiveness, what is required from the customer, and what metrics matter when measuring success.

 

With real-world insights, peer experiences, and challenging questions on the table, this session will help you rethink how MDR fits into your broader security strategy.

 

  • What does “effective MDR” actually look like in practice?
  • How can you tell if your MDR provider is truly improving your security posture?
  • What questions should you ask before choosing or renewing an MDR contract?
  • What role does the customer play in ensuring MDR success — and what does effective collaboration look like?

Speaker: Jared Henderson

Founder, Falx Cyber Security (Teleport)

Speaker: Vivek Rao

Information Security Risk Specialist, Entercard Group AB

The Digital Operational Resilience Act (DORA) came into full effect on January 17, 2025, ushering in a new era of stringent cybersecurity and operational resilience requirements for financial institutions and their technology providers operating in the EU. So now what? 

Non-compliance isn’t just risky—it has real regulatory and business consequences, including mandatory contract termination for non-compliant ICT vendors.

But achieving DORA compliance across today’s sprawling, complex infrastructure is no small feat. From on-prem data centers to cloud-native environments and dynamic DevOps pipelines, financial organizations and ICT providers alike face an uphill battle: securing every access point, ensuring continuous monitoring, and maintaining productivity without compromise.

  • Eliminate credentials and standing privileges to reduce unauthorized access risks
  • Implement dynamic, least-privilege access controls with short-lived certificates
  • Gain real-time visibility, auditing, and automated incident response
  • Support operational continuity while boosting developer productivity
  • Align with DORA’s five-pillar ICT risk framework

Speaker: Naime Surenkok

Senior Sales Engineer & OWASP, Detectify

Today, security teams want to cover everything across their digital attack surface. But knowing what you’re exposing and what you should be scanning remains a challenge. You’re covering your core web apps, but if you were asked today, "What other apps should we be covering?" The answer is often, "I'm not sure." Why is that? Because always knowing the right targets to scan and why you should scan them is unlikely for any individual or even an entire security team. But does it have to be this way?

Join our table where we will tackle this challenge head-on with a hacker's mindset.

Questions we’ll cover:

  • How does your organization select targets to scan?
  • What are the factors you consider when selecting targets to scan?
  • How do you work with vendors to help you figure out what to scan?
  • How do you see these challenges evolving with AI tools becoming more involved in AppSec?

Folks who come to our table will get insights into:

  • Why attackers don’t care about what you think is exposed, they care about the apps you miss. How diving into the signals – like the presence of JS libs, cookie consent, specific headers, or analytics, PII data – can reveal hidden web applications that you may not be aware of.
  • How it’s possible to keep an eye on everything you’re exposing, all while knowing when you should be taking a closer look at an application that you didn’t know about that could be hacked. You can go from just knowing your top 10 apps to knowing everything.

Go Hack Yourself.

Speaker: Jon Neal

SVP & Field CTO, Saviynt

Speaker: Mehran Ahsant

IAM Manager Electrolux IAM and Global Security, Electrolux

As digital ecosystems grow, fragmented B2B connections creates security gaps, compliance risks, and poor user experiences. Siloed solutions lack scalability, interoperability, and trust across partners and suppliers.

Thomas Zuliani

Global Chief Information Security Officer

Thomas Zuliani is a seasoned cybersecurity expert and the Global Chief Information Security Officer (CISO) at ARLA Foods, with extensive experience in leading security strategies across multinational organizations such as Pandora, Vestas or Siemens. He has a proven track record in risk management, data protection, and securing global infrastructure. Passionate about driving innovation in cybersecurity, Thomas is committed to safeguarding the integrity of digital transformation and ensuring compliance with industry standards, which granted several awards and recognitions on the past years, such as

  • Top Global CISO in the World by Cyber Defense Magazine 2024
  • Best Global CISO Top100 by HotTopics 2023 & 2024
  • Top 3 Best CISO Denmark by ComputerWorld 2022

Board Memberships & Advisory Roles: Nordic CISO Governing Body (Evanta/Gartner), Executive Advisory Board (IDC, SailPoint and Orange Cyber Defense)

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force

CISO of the year award for 2019, Luxembourg. The Global Cyber Sentinel Award Winner 2020 for immense contribution to cybersecurity domain globally. CISO of the year Europe 2021.

Versatile and innovative professional with emphasis on cyber security risk management, policies and procedures creation, IT/IS security, IT Operations, audit, risk mitigation, business process improvement and IT governance. Proven results in building internal and external client relationships, even at government levels for best cybersecurity practices, and driving growth in competitive and ever-changing markets. Proactive in assessing and responding to market and consumer trends. Highly effective at identifying and implementing business process improvements while safeguarding and adding to controls. Skilled at communicating effectively with clients, senior management and colleagues. Speaker at various events, such as UN, Risk.Net, RiskMinds, GISEC, etc.

Specialties: Cybersecurity, Policy development, IT Change and Incident Management development and implementation, IT Security, people management, SLA managment, Auditing financial systems, Risk management, Negotiations, Creative problem solver, Analytical thinker, Strong decision maker, Results driven, Innate ability to develop interpersonal relations, Proven leadership in all aspects of the workplace, Project Management, Risk Assessment & Mitigation, IT Governance & Stakeholder Liaison, Organizational Leadership & Change, COSO/COBiT Controls, Bloomberg, Microstrategy, Business Process Improvement, SOX, AutoAudit/Focus/SQL/Visio/ACL/MS Access, EBA, and ISO/IEC 27001:2013

David Jacoby

Pwn Star

David Jacoby is one of Sweden’s most boldest hackers and IT security experts. He has over 25 years of experience in professional hacking and has won several awards both as a speaker and for his unique research and dedicated work to stop digital crime. In addition to his own research, he was one of the main hackers in HACKAD_ a Swedish TV show named “HACKAD_” where David and three colleagues have hacked Swedish companies live on the TV screen to show the complexity and necessity in issues such as IT security.

Dr. Tim Nedyalkov

Former TISO, Commonwealth Bank of Australia

Dr. Tim Nedyalkov is a globally recognized cybersecurity and AI security leader with over 20 years of experience in technology, cybersecurity, and digital risk, spanning across Europe, the USA, Australia, and the Middle East. A distinguished expert and keynote speaker, he has held executive cybersecurity roles at the Commonwealth Bank of Australia, Riyadh Metro Network, and Australian Broadcasting Corporation. Tim holds a doctorate in Cybersecurity & Information Assurance from the University of Fairfax and a master’s degree in IT Management from the University of Sydney, along with certifications such as C|CISO, CISSP, CCSP, CISA, CISM, CRISC, CGEIT, CDPSE, and ISO 27001 LA. Tim has been a frequent keynote speaker and panelist at over 70 industry-leading conferences. Tim’s leadership in cybersecurity has been recognized as the 2024 iTNews Benchmark Security Leaders in Finance, 2022 Cyber Security Personality of the Year, 2022 Onalytica Who’s Who in Cybersecurity Influential Voices, and 2022 Top Cyber News Magazine 40 under 40 in Cybersecurity.

Deepak Subramanian

Group CISO, EnergyOne

We are honored to present our renowned keynote speaker! Their impressive journey, expertise, and contributions will soon be showcased in a detailed biography. Stay tuned for an in-depth look at their insights and impact. More details coming soon!

Dan Anconina

CISO, XM Cyber

Dan Anconina is the Chief Information Security Officer (CISO) at XM Cyber, where he leads the cybersecurity department with a focus on innovation and maintaining a low-risk tolerance in the ever-evolving cybersecurity landscape. 

With a strong technical background and hands-on experience, Dan plays a pivotal role in advancing XM Cyber’s security posture. In addition to driving technical initiatives, Dan oversees governance, risk assessments, and compliance (GRC) efforts to ensure holistic risk management. 

With over 11 years of experience, Dan has built and managed GRC, Infosec, and SOC teams from the ground up and has been deeply involved with creating and establishing cross-company procedures. 

Prior to XM Cyber, Dan held several roles at CheckPoint technical support center, leading VIP customers and managing security teams. 

Dan holds a BSc in electrical engineering and communication and brings valuable experience in M&As, securing development lifecycles, and risk assessment.

Philip Wiberg

Senior Solutions Engineer, AKAMAI

With a strong background in network and security, Philip’s understanding of the network security threats we face today, combined with an understanding of business value drivers, is an excellent combination in the modernization of the security landscape.With more than a decade of experience in network security, Philip delivers a powerful message that’s impossible to tune out.

Zsolt Fabian

Group Cybersecurity Lead, Byborg Enterprises

Zsolt is a seasoned cybersecurity professional with a career spanning over 15 years. As a Group Cybersecurity Lead, Zsolt has built robust security programs and assembled high-performing teams for some of the world’s Top 100 high-traffic websites, technology companies and payment systems. With a dedication to cybersecurity he has significantly contributed to making the digital world a more secure space for everyone. Known for a strategic, data-driven approach, Zsolt’s expertise in risk management and incident response has been instrumental in mitigating security threats for businesses of all sizes.

Smeden Svahn

CISO, Adda

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Linda Avad

CISO,OKQ8

With over two decades in information security, my role as Chief Information Security Officer at OKQ8 is complemented by my expertise in cyber defense at Försvarsmakten. My competencies extend to agile methodologies and software project management, ensuring strategic oversight and robust security infrastructure. At OKQ8, our mission to protect corporate assets aligns with my goal to innovate and strengthen cybersecurity measures. My certification as a CISA underscores my commitment to excellence in this dynamic field.

Jan Öhman

Information Security Evangelist

Proven leader with 30 years of senior management experience from the software and manufacturing industries. As the CEO I managed a company from its inception through twelve years of strong international growth to revenues of 200+ MSEK and over 150 employees – all while delivering double digit EBITDA margins. As the CIO/CISO I have been deeply involved in ensuring adequate information security and in developing a combined management system very successfully obtaining and maintaining certificates for ISO 9001 and ISO 27001. Key success factor have been staff empowerment, trust building and a leadership boosting engagement.

Sanjay Kumar

Threat Intelligence Manager, Landis+Gyr

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Christian Hedström

CISO, QD Sverige AB

Christian is the Chief Information Security Officer (CISO) at QD Sverige AB, a prominent Swedish Managed Service Provider (MSP) established in 1989. With over 25 years of IT experience, Christian has excelled in IT operations, helping customers maximize their IT investments. He successfully led an ISO 27001:2022 certification from scratch, launched impactful security awareness programs, developed IT security services, and conducted thorough security assessments covering both Governance, Risk, and Compliance (GRC) and technical aspects. As a dedicated cybersecurity ambassador, Christian bridges the gap in understanding between boards, executives, techies and users, fostering a culture of security awareness and resilience. CISO and consultant. IT- and information security expert with more than 25 years of experience.

Anders Jared

CISO, Bravida

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Nithin Krishna

Head of Cyber Security, Jeppesen

For over 19 years, I have served as a Cybersecurity Architect, Leveraging industry-recognized certifications like CISSP, OSCP, and AWS-Sec, I possess in-depth expertise across various cybersecurity and cloud domains. I am passionate about empowering organizations to safeguard their data and assets from ever-evolving cyber threats, ultimately optimizing their overall security posture and performance.

Lars Ponten

Cybersecurity Evangelist

Lars has worked over 20 years with logistics systems for the Swedish Armed Forces as programmer, security architect etc etc, protecting very sensitive information. Lars has worked 5 years with digital healthcare SaaS-solutions, for example as CISO for Doctrin and for ImagineCare, protecting sensitive patient data.

Prof. Shahid Raza

Professor, University of Glasgow, UK

Shahid Raza, an internationally renowned cybersecurity expert, is a Full Professor and the Chair of Cybersecurity at the University of Glasgow, Scotland, UK. He co-founded Cybercampus Sweden (cybercampus.se), serving as its Research Director, and is affiliated with RISE Sweden and Mälardalen University (MDU) as Research Director and Professor, respectively. As Director of the Cybersecurity Unit at RISE Sweden for eight years, Shahid established it as one of Sweden’s largest technical cybersecurity groups, pioneering research in fundamental and applied cybersecurity. He also founded the RISE Cyber Range and the Swedish Cybersecurity Research and Innovation Node (cybernode.se). Shahid’s scholarly contributions, with over 7,000 citations, are published in leading journals and conferences. He holds a Swedish Docentship from Uppsala University, a PhD from Mälardalen University, and an MSc from KTH, all in cybersecurity. Homepage: https://shahidraza.net

Daniela Lourenço

Global CISO, Hunkemöller

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Giovanni Söderman

Vice President Global IT, Consilium Safety Group

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Martin Vallee

CISO,CSO & Head od DevOps, Eyeonid

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Shahmeer Amir

Ethical Hacker

Shahmeer Amir is a world-renowned Ethical Hacker and the 3rd most accomplished bug hunter who has helped over 400 Fortune companies, including Facebook, Microsoft, Yahoo, and Twitter, resolve critical security issues in their systems.
Shahmeer is the Cyber Security Advisor to the Ministry of Finance Government of Pakistan, involved in multiple projects regarding Deep Sea Tracking, Digital Transformation of Legislation, and Digitization of Pakistani Cultural Content. He is also a member of Forbes Technology Council.
As an Engineer and a Cyber Security professional with relevant certifications from renowned organizations like EC-Council, Mile2, SANS, etc., Shahmeer is currently looking at the Blockchain technology for his doctorate. He has authored three books, including Bug Bounty Hunting Essentials, and a dozen research papers.
Shahmeer is a highly sought-after keynote speaker on Cyber Security, Blockchain, and other technologies, having been invited to over 80 conferences globally. including Blackhat, GiSec, FIC, AEC Alberta, Hackfest and many more. He has also been accepted at multiple prestigious academic institutions in their entrepreneurship programs, including Stanford. As a CTO of companies, Shahmeer has learned to code in 25 languages and read code in 35, making him an expert in multiple technologies.

Thomas Evertsson

Head of IT, Swedish Film Institute

Thomas Evertsson Norrevik is a seasoned technology leader with over 25 years of experience, specializing in transforming IT operations and building high-performing teams. His professional expertise encompasses infrastructure modernization, digital workplace transformation, and strategic technological innovation. At the forefront of emerging technologies, Evertsson is particularly passionate about integrating artificial intelligence into organizational strategies, helping businesses leverage AI to enhance operational efficiency, drive innovation, and unlock new competitive advantages. His leadership approach focuses on developing collaborative environments, strengthening security measures, and guiding organizations through complex digital transformations with strategic thinking and clear communication.

Teresia Willstedt

ISO, MedMera Bank

Teresia is the ISO and main responsible of Business Continuity at MedMera Bank, Sweden. She loves working within IT-security since you will always have something to do and you will always learn more. Passionate within her field 2023 she also started offering to share her knowledge within information security to childrens in middle school age, to contribute to a more secure, future society.

Dag Friden

Chief Information Security Officer, Aros Kapital

Previously, I worked as an IT manager and service owner at companies in the AcadeMedia group, IT manager at the financial company Aros Kapital where a major focus was on regulatory compliance, safe and stable operation of the company’s systems and working for a continuous digitization of the business.
Worked before the position at Aros as development manager at Eventful and before that as IT strategist for Vaxholm city and consultant at Pulsen. Studied computer engineering at Chalmers and holds several certifications from Microsoft in both communication, mobility, Azure and client management. Has attended training in and worked with project management.
Completed migration from Exchange OnPrem to Office 365 in Nynäshamn, Heby, etc. Is the main writer and project manager in developing Vaxholm’s city’s IT strategy.

Anupama Jaiswal

Senior Information Security & GRC Lead, Truecaller

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thea Sogenbits

CISO, Estonian Tax and Customs Board

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Vivek Rao

Information Security Risk Specialist, Entercard Group AB

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Georgios Kryparos

CISO, Einride

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Johan Nordin

Director of IT & IS, Extenda Retail

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thomas Warneryd

CISO,Scandi Standard

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Adnan Jamil

CTO, Frank Penny

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Elnaz Tadayon

H&M

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Dimitrios Stergiou

Director of IT and Information Security, Taptap Send

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Thom Langford

EMEA CTO, Rapid7

Thom serves as EMEA CTO at Rapid7. With over two decades of experience in security strategy, information security, and risk management, Thom has built a reputation for bridging the gap between technical teams and business executives. He is known for his pragmatic approach to cybersecurity, focusing on aligning security initiatives with business objectives to drive growth and resilience. Thom is also a sought-after speaker, writer, and thought leader in the cybersecurity community, often addressing topics such as organisational risk, security culture, and the evolving threat landscape. Thom’s expertise has been instrumental in shaping robust security postures for global organisations across various industries.

Tom Kjølhamar

Leder for IT-sikkerhet, Moelven Industrier Censys

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Bala Periasamy

Nordic Cyber Security Industry Lead, Accenture

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Hugo Sigurdson

Security Engineer, CrowdStrike

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Kouadio Simon N'zué

Aircraft System Engineering, Airbus

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Jan Olsson

Police Superintendent, Polismyndigheten Swedish Cybercrime Center SC3

Fraud expert From the time at the police’s national fraud center with 30 years of experience in police work and 14 years dedicated to Fraud. Since autumn 2018, more against complex cybercrimes at the Swedish Cybercrime Center (SC3). Lectures nationally and internationally on everything from Social Engineering complexity to Monetary threats and societal consequences of laxity around Cybercrime and Fraud.

Gareth O'Sullivan

Lead Trust & Security Engineer for EMEA, Bugcrowd

Gareth joined Bugcrowd in May ’21 as the Lead Trust & Security Engineer for EMEA. He’s an experienced business, technology and information security professional. With over fifteen years of experience in the security industry, primarily focused on security testing, compliance and secure software development. In previous roles he’s led a startup, built a reseller channel, and led sales engineering teams for other well-known technology companies.

Elpidoforos Arapantonis

Senior Information Security Officer, Vattenfall

Elpidoforos Arapantonis is a Senior Security Officer in the energy sector with extensive experience in Information and Cyber Security. Over the past decade, he has held key security roles in the automotive and energy sectors, he has worked with OEMs and suppliers to strengthen security strategies, implement risk mitigation measures, and align cybersecurity practices with industry standards. 

Peter Hampus

CIO, Nackademin

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Jaens Stafren

Account Executive EMEA, Keeper

Jaens Stafren is a seasoned sales professional with extensive experience in the cybersecurity industry. He has over 20 years experience in helping organisations strengthen their security posture, working with businesses of all sizes from small start-ups to global enterprises. Jaens worked with EMC, Dell Software and VMware prior to joining Keeper Security, where he is dedicated to helping organisations to stay one step ahead in today’s ever-changing digital landscape.

Stephen McDermid

Regional CSO, EMEA, OKTA

Stephen has led and been responsible for several enterprise wide transformations ranging from National Government transformation projects to ISO27001 and PCI-DSS accreditation across multiple sites. He’s taken his hands on knowledge and expertise and used them to help organisations manage security across a broad range of disciplines and ensure senior stakeholders understand the risks and more importantly the opportunities available to their business. He’s worked with some of the largest organisations across Military, Banking, Government and Enterprise sectors such as NATO, UN, BoE and the UK Home Office.

Trevor Dearing

Global Director of Critical Infrastructure Solutions, Illumio

Trevor Dearing has worked in networking and security for over 40 years. He has attended the birth of nearly all the technologies that we now take for granted including, Ethernet Switching, VPNs, Firewalls and virtual networks. Originally an engineer working on some of the first network and cyber security systems, he is now the Global Director of Critical Infrastructure Solutions for Illumio.

Christian Reinhardt

Director Human Risk Management, SoSafe

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Russ Bentley

Executive Vice President Product Marketing, Zerofox

We’re excited to introduce our esteemed speaker! A comprehensive biography highlighting their achievements and expertise is currently being prepared and will be available soon. Please check back shortly for more details.

Santhosh Jayaprakash

Founder & CEO, Unosecur

Santhosh is the founder of Unosecur, a next-gen cybersecurity startup focused on protecting enterprises from identity-based threats in the cloud era. A serial tech entrepreneur by passion, Santhosh brings deep, hands-on experience across international cloud, security, and big data consulting—paired with a strong track record in global sales, business development, and product strategy.

Over the years, he has led and contributed to high-impact initiatives in cloud sales, IT consulting, agile delivery, project and program management, and vendor strategy—working with global clients to deliver innovative, scalable solutions. His ability to drive both technical excellence and commercial success has been key to launching and growing Unosecur into a category-defining player in identity security.

Santhosh specializes in Cloud, Big Data, ML & AI consulting, SaaS sales, startup activation, go-to-market strategy, and product development. He’s especially passionate about emerging tech like IoT, AI automation, and VR—and thrives at the intersection of business, technology, and innovation.

Rui Shantilal

Vice President at Devoteam Cyber Trust, Devoteam Google Cloud Business Unit

 Rui Shantilal is Vice President at Devoteam Cyber Trust, Devoteam’s cybersecurity unit. He co-founded Integrity in 2009, a firm specializing in cybersecurity consulting and technology auditing, which was acquired by Devoteam in 2021. With over 25 years of experience in information security and managed services, Rui has held leadership roles at Oni Telecom and GLINTT. He holds an MSc in Information Security from Royal Holloway, University of London, and certifications including CISSP, CISA, ISO 27001 Lead Auditor, and ITIL. Rui is known for his expertise in resilience-driven cybersecurity and frequently speaks on technology and information security topics

Louise Lundgren

Regional Sales Director, Nordics & BeNeLux, OffSec

Louise has worked in various aspects of Cyber Security over the last decade, ranging from EDR, XDR, MDR and more, and one thing has remained true throughout; you cannot “product” your way out of user behaviour. Because the digital landscape is constantly evolving with new threats and vulnerabilities emerging regularly a one-time awareness training is insufficient. At every level of our organisations we must commit to arming our people with the knowledge required to stay vigilant, but the questions remains, what exactly is the best way to do this? 

Elena Marzi Tornblad

Cybersecurity Specialist, RISE Research Institutes of Sweden

Elena Marzi Tornblad is a cybersecurity engineer at RISE (Research Institutes of Sweden) with a combined background in engineering and law. She specializes in cybersecurity for vehicles and industrial control systems and brings solid experience in IT security. Elena is a CISSP-certified professional and supports organizations through guidance on regulations, standards, and risk analysis. At RISE, her role focuses on performing assessments and guiding companies toward compliance by integrating cybersecurity into their products. With a strategic and business-aware mindset, she works to ensure cybersecurity aligns with both organizational goals and regulatory expectations.

Sharon Larsson

CISO, Svenska Spel

Sharon is the CISO at Svenska Spel, the Swedish state-owned gambling company, which is also strongly involved in Sweden’s sports movement. Originally from Ireland and based in Sweden since 2006, Sharon has been working within IT & Operations organisations for 20 years with a broad range of roles from technical to leadership & strategic positions. Her background has spanned from driving change in large global companies to getting small start-ups off the ground, and has covered public institutions to private corporations and businesses. Information Security has been a primary focus for several years, where Sharon takes a hands-on approach in translating the various regulations and requirements into actions that are relevant to the business – keeping the human factor and people aspects central to driving a strong security culture.

Marius Baczynski

Director - Cloud Security Services (EMEA), Radware

 Marius Baczynski is Director of Cloud Security Services at Radware. Backed by more than 20 years’ experience in cyber security sales and business development, he helps enterprises design and execute their digital transformation projects. Marius works with c-level execs to identify the right cloud strategy for their business and ensure that their migration to the cloud is secure and their applications are protected. Marius holds a Bachelor of Computer Science degree from University of Western Sydney, Australia and an MBA from Open University Business School in London, UK.