In just one day, you’ll learn what you need to stay ahead of tomorrow’s cybercrime.
THE BEST Nordic Cybersecurity Event will provide You with
Top Notch Speakers
Interactive Sessions
Structured Networking
Comprehensive Agenda
Coming Soon
Stockholm Waterfront Congress Center
What is
Nordic IT Security?
The most reputable cyber security summit in Scandinavia, Nordic IT Security, has been around for 17 years acting as a steering wheel for navigation through the Nordic’s “cybersecurity watch-out” scheme.
With its distinguished speakers and partners, the summit offers a platform for seasoned industry professionals to convene and discuss business critical topics. Covering the latest cutting-edge technology, the event is designed to secure all aspects of the challenges faced by global communities in the 21st century.
Our research has shown that a great majority of businesses and companies across all industries are likely experiencing the same or similar pain points. Join us this May in Stockholm to delve into the root causes of these pain points and find the best solutions.
THE BEST 2023 Aftermovie - Nordic IT Security
Keynotes, May 23, 2024
David Jacoby
Ethical HackerMikko Hypponen
IT Security GuruMikko works as the Chief Research Officer for WithSecure and sits on the advisory boards of Europol and Verge Motorcycles.
Arnaud Wiehe
FedExPatric J.M. Versteeg
Sunette Runhaar
Nir Chervoni
Booking.comShadow IT - By 2027, 75% of employees will acquire or create technology outside IT’s visibility.
AI, a blessing in disguise or real
curse?
Cybersecurity awareness for the boards!
The pressure is real. Reskilling and/or upskilling is paramount to reduce the skills gap.
Top 10 ransomware gangs and their ways of operation
Recommended Solution Providers
at THE BEST Cybersecurity Conference 2024
On a mission to help organizations of all sizes and industries rapidly identify and remove...Read more
SoSafe empowers organizations to build a security culture and mitigate risk with its...Read more
GitGuardian is the code security platform for the DevOps generation that offers automated...Read more
Cribl makes open observability a reality, giving customers the freedom and flexibility...Read more
Exterro empowers organizations to manage their Legal Governance, Risk and Compliance (Legal GRC) requirements proactively and defensibly.
KnowBe4 is the world’s largest integrated platform for security awareness training combined with simulated phishing attacks
Recorded Future empowers countries and organizations with the right intelligence at the right time, to keep our people and infrastructure safe.
Anyone with an Internet presence boast faster, more secure websites and apps thanks to Cloudflare.
Sekoia.io is a European cybersecurity SAAS company, whose mission is to develop the best protection capabilities against cyber attacks.
anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
De-risk your entire asset landscape with proactive testing, expert triage, and insights from the world's best hackers.
Transforming cybersecurity for people and organisations around the world
Snyk is a developer-first security company that helps software-driven businesses develop fast and stay secure.
Learn how HashiCorp helps organizations like yours move to a zero trust model with identity-based security technologies.
We are creating a new era of modern crowdsourced security that outpaces threat actors.
A global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.
is on a mission to safeguard enterprises through intelligent, cloud-first identity governance & access management solutions.
The most-trusted global provider of high-assurance TLS/SSL, PKI, IoT and signing solutions.
premier security testing platform enables a vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with transformational results.
the global leader in cybersecurity ratings and the only service with millions of organizations continuously rated.
Our mission has been about one thing—creating the connections that power businesses and the world.
Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars.
is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.
is the leader in application security and ensures that enterprises worldwide can secure their application development from code to cloud.
Media Partners
at THE BEST Cybersecurity Conference 2024
Cybersecurity Review is a print and digital magazine reaching out to over 92,000 Sr. technology & corporate decision-makers...
Community dedicated to professional actors or interested enthusiasts of information security based in Sweden.
How it was in May 2023?
You speak we just copy paste
Dana Toren
Director, Head of National Incident Management Center<br>Israel National Cyber DirectorateIsabella Södergren<br>DELEGATE
OrganizerZero trust is more than the latest tech marketing buzzword; it’s a practical approach to securing container environments. This model emerged as the application/service perimeter began to disappear as we evolved from physical devices to VMs, microservices and finally, distributed workloads in the cloud and at the edge. This evolution has forced improvements in the security model – from a reactive model that uses deny lists and firewalls to protect the known perimeter to proactive, zero trust models. With zero trust, we’re minimising the attack surface by using an “allow” list that blocks unapproved network connections and processes, so that teams can stop attacks before they start and stop zero-day threats by their suspicious behaviour activities.
Even the best firewalls, filters, backups, and VPNs can't prevent a cyber attack. In addition to well-developed technology and infrastructure, the awareness of all employees is very important. We claim that we need more than just awareness but a cybersecurity culture in order to really change behaviour of all stakeholders. First of all, cybersecurity culture needs an assessment of organisational, technical and human competences. In order to form a cybersecurity culture, various awareness campaigns go hand in hand with capacity and competence building, i.e. cybersecurity training as well as anchoring it in all management and business processes. We will present how this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture.
Swantje Westpfahl
Director," Institute for Security and Safety GmbH at the UAS Mannheim"Cybersecurity makes headlines more frequently in the past years. How are our daily lives affected by cybersecurity incidents? Which are the industries which need to be concerned the most and which are their challenges?
• Does the evolving threat landscape affect the infrastructure architecture?
• Which are the key industries that need to be in the spotlight?
• What is the perception of society when it comes to cybersecurity?
Emma Nilsson<br>DELEGATE
System developer with interest in cyber security and AICyber Threats show no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Attack Chain, creating new planes of privileges for attackers to exploit
In this session you will learn how you can break the attack chain and establish a solid foundation for security project success, including:
• Common attack chain entry points
• Practical steps you can take to block entry
• How PAM ensures project success
Raed Figueroa <br>DELEGATE
Senior IT AnalystHow does Europe's prominent food delivery platform maintain cloud efficiency and Security as it grows its network of customers, merchants, and couriers? Learn in this session Key Takeaways:
• How to assess and report on your maturity joUnderstand the impact of growth on your cloud security program
• How to crawl, walk, and run in a modern cloud security program
Elin Ryrfeldt
CISO, AxfoodSofie Sundåker<br>DELEGATE
CISORohan Karat
Paul Newton<br>DELEGATE
OwnerModern cloud native technologies enable you to build, deploy, and scale rapidly. But this increased complexity exposes your application to new risks and vulnerabilities. Each layer of your cloud native application – spanning your code, third party dependencies, containers, and clusters – exposes you to new security concerns. Learn how you can protect your application through clear remediation actions and best practices, and how Developers are key in the transition to DevSecOps.
Elpidoforos Arapantonis
Senior IT Security Officer<br>Volvo Autonomous SolutionsJari Rasinen<br>DELEGATE
Product Security ManagerM. Shahmee Amir
CEO/CTO<br>Younite• With the massive migration to cloud infrastructure and many new cloud-native companies, management of human and service identities and entitlements has become an extremely significant factor in the security posture of cloud infrastructure.
• The dynamic nature of cloud development and operations leads to inadequate management of the identities and access privileges that hold the key to applications and data. On the other hand, they give security professionals a level of control that was previously unimaginable.
• During this session we will explore the opportunities and risks, and review the recently published IDSA CIEM (Cloud Infrastructure Entitlements Management) best practices for managing identities in your cloud environment to limit the attack surface and help reduce blast radius in case of a breach.
Navaz Sumar
Chief Information Security Officer<br>TF Bank ABJan Olsson
Crime Inspector<br>Swedish Cybercrime Center“I come to Nordic IT Security to find out what´s happening in the world of computer security, what the newest threats are, which way we can protect ourselves and network with others.”
Graham Cluley
Award Winning Blogger
“Nordic IT Security is a great place to meet the right people.”
Mikko Hyppönen
IT Security Guru
“The reason why I really enjoy to attend Nordic IT Security is because I can better educate the market on how to protect themselves against Cyber Crime and attacks.”
Jane Frankland
Award Winning Cybersecurity Entrepreneur