The sum of all fears
Together never felt so good.
27 January 2022
Speakers are what makes our event stand out.
We frequently update our speaker list, subscribe to our event announcements and stay updated!

Sameer Sait
Former Chief Information Security Officer, Amazon (WFM)Â

Brian Yap
Head of Blockchain Security, Crypto.com

Albin Zuccato
Chief Information Security Officer, ICA Gruppen

Erik Täfvander
Head of Cyber Security, ATG

Patrick Andresson
CISO, Stora Enso

Ola Ponten
CISO, SCA Forest Products

Jonas Gavelin
CIO, Bankgirot

Harri Hautala
Cyber Security Specialist, Handelsbanken

Jacob Schlawitz
CIO/Group CEO, Max Matthiessen

Liudas Alisauskas
CISO, ConnectPay

Martynas Savickas
CISO, SEB Bank

Sofia Staaf Frederiksen
CISO, Apoteket

Navaz Sumar
CISO, TF-Bank

Elpidoforos Arapantoni
Chief Product Security Officer, eCarX Europe

Sireesha Dandu
Head of Enterprise & Product Cyber Security, Zenseact

Torbjörn Larsson
CIO, Falkenbergs kommun

Peter Hampus
CIO, Nackademin

Thomas Dahlbeck
Chief Information Security Officer, Internetstiftelsen

Svante Nygren

Edwin Weijdema
Global Technologist, Product Strategy, Veeam

Elin Ryrfeldt
Informationssäkerhetschef (CISO), Axfood

Daniel Olsson
CIO, Capio Sverige

Joseph Carson
Chief Security Scientist & Advisory CISCO, Thycotic

Gerhard Giese
Industry Strategist, Akamai Technologies

Adam Preis
Senior Product & Solution Marketing Manager, ForgeRock

Kaja Narum
Head of IBM Security

Rob Allen

Nicolas Corrarello

Luis Delabarre

Thomas Wärneryd
acting CISO, Scandi Standard
Sum of all fears edition
27th January, 2022
8:00
The Power Breakfast by Operakällaren & The Chairman’s address
8:30
The Scandi Way Better Chicken for a Better Life

Thomas Wärneryd
acting CISO, Scandi Standard
8:45
In Conversation With - "Identity as the new security perimeter"
In today’s corporate environments, employees are accessing a variety of services using multiple devices while working across time-zones and with 3rd parties that are tightly integrated into core business activities. Identity is the only mechanism that can both enable organizations to secure resources while giving end-users the convenience and ease-of-use they seek.

Sameer Sait
Former Chief Information Security Officer, Amazon (WFM)Â

Malcolm Larri
Host, NITS SOAF
9:10
Expert Panel - Evolution of Ransomware, the Journey from being the monkey to the Human!
- Commodity ransomware
- Human-Operated Ransomware
- Ransomware Brands
- Preventing Ransomware Attacks

Edwin Weijdema
Global Technologist, Product Strategy, Veeam

Ola Ponten
CISO, SCA Forest Products

Peter Hampus
CIO, Nackademin

Albin Zuccato
Chief Information Security Officer, ICA Gruppen

Patrick Andresson
CISO, Stora Enso

Sofia Staaf Frederiksen
CISO, Apoteket
9:40
Keynote - Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
An increasing number of MSPs have reported being victims of ransomware attacks. Cybercriminals are exploiting MSP products and services, including remote monitoring and management (RMM) tools. These tools are often accessed through software vulnerabilities or brute force attacks. Is your MSP prepared to protect against ransomware?
Join Ben Jenkins, ThreatLocker Senior Solutions Engineer as we discuss what you can do to prevent cybercriminals from carrying out an attack.
Find out:
- How cybercriminals can hack your vulnerable data and what you can do to stop it
- Learn more about the ever changing cybersecurity landscape
- Find out how ThreatLocker can help you better protect you and your clients

Rob Allen
10:00
Roundtable discussion – Key takeaways from the morning sessions
10:20
Coffee Break
10:40
Keynote – Live Hack
Securing privileged access to stop attackers in their tracks
See why endpoints are the favoured targets of attackers in this live hack simulation, and how cyber criminals use compromised credentials to escalate privileges and access your cloud applications.
Join Thycotic Chief Security Scientist, Joseph Carson, as he demonstrates how an attacker captures an employee password on an endpoint, gets hold of an email account, and escalates the exploit to access a critical cloud application—all undetected by typical security controls. Then, see how you can stop these endpoint attacks and protect privileged access to critical cloud applications with PAM security solutions.
What will you learn?
- The favoured techniques and tools for compromising employee credentials
- How an attacker escalates privileges to gain access to cloud apps
- What you can do to shut down attacks before they escalate
Get the answers to these important questions
- Who is most at risk for credential compromise?
- How do I align PAM tools to my application security priorities?
- What’s the best way to enforce least privilege for cloud apps?

Joseph Carson
Chief Security Scientist & Advisory CISCO, Thycotic
11:00
Keynote - Keep Ahead of the Trends: Security in 2022
Powered by necessity, 2020/21 saw a gigantic boost for digital strategies. This helped to maintain critical services through online availability but it also gave new incentives for cyber criminals claiming their share of the profit. Join us for a lively presentation of some of the year’s biggest security stories. Together our expert Gerhard Giese is going to
- Discuss the latest threats the world has been experiencing in 2021
- Share use cases and examples on how other corporations managed to recognize and fight them
- Predict on security trends and the threats cape in 2022

Gerhard Giese
11:30
Expert Panel - Zero day vulnerability exploits within the Fintech industry!
- We all know the vulnerability management market is growing rapidly, is it good news or bad news?
- Prediction is the way to nullify the zero day threats! If these threats are not addressed and mitigated, what is expected?

Martynas Savickas
CISO, SEB Bank

Jonas Gavelin
CIO, Bankgirot

Harri Hautala
Cyber Security Specialist, Handelsbanken

Kaja Narum
Head of IBM Security

Liudas Alisauskas
CISO, ConnectPay

Jacob Schlawitz
CIO/Group CEO, Max Matthiessen
12:00
The Networking Lunch by Operakällaren
13:00
Cryptojacking! - In Conversation With
- How does cryptojacking work?
- Attackers hurting where it hurts the most for an organisation, their customers! How do you suggest preventing this?

Brian Yap
Head of Blockchain Security, Crypto.com
13:20
Fireside Chat - After Solarwinds and Log4j, what are the lessons learnt ?
- We live with a false sense of security
- What makes Sunburst (Solarwinds) and Log4Shell attacks so unique and difficult to address
- The comeback of the detection
- Network never lies

Luis Delabarre

Malcolm Larri
Host, NITS SOAF
13:50
Keynote - Enable Digital Identity to Elevate Security and Customer Experiences - Without Compromising
- Leverage digital identity to mitigate fraud and cybersecurity risks by extending identity-first Zero-Trust security through context-driven passwordless, multi-factor, and strong customer authentication
- Build a single view of customer identity to accelerate digital adoption, understand customer needs, and strengthen brand loyalty across all devices, applications, and third-party platforms
- Leverage innovative identity and access management technologies to reduce costs, time to value, and maximise ROI on digital

Adam Preis
Senior Product & Solution Marketing Manager, ForgeRock
14:10
Expert Panel - The rise in cyber risks in the new hybrid work environment
- Discovery of hybrid working environments! With increased cybersecurity risks for organizations it is vital to understand how we can prevent those threats?
- Pros and cons of hybrid work environment
- What does the future look like?

Erik Täfvander
Head of Cyber Security, ATG

Thomas Dahlbeck
Chief Information Security Officer, Internetstiftelsen

Sireesha Dandu
Head of Enterprise & Product Cyber Security, Zenseact

Torbjörn Larsson
CIO, Falkenbergs kommun

Daniel Olsson
CIO, Capio Sverige
14:40
Round Table Discussion – Key takeaways from the midday sessions
15:00
Coffee Break
15:20
Expert Panel - Fake news creating real trouble! Social Media Disinformation and Spoof Accounts
As we know every business and organisation has increased the use of social media activity tremendously, especially during this pandemic hence attackers taking the opportunity to cause damage to the organisations.
- How to analys, predict and take effective action in order to put a stop to these attacks?
- Who is responsible for the security? Cyber security team, IT team or organisation as a whole?

Elin Ryrfeldt
Informationssäkerhetschef (CISO), Axfood

Navaz Sumar
CISO, TF-Bank

Svante Nygren

Elpidoforos Arapantoni
Chief Product Security Officer, eCarX Europe
15:50
Presented by Wiz
One for the road from The Royal Opera House
Breaking through the noise.. applying the security principals you learned today
- Dealing with the CVEs we know about and mitigating the future zero-day and supply chain issues.
- Minimising lateral movement by understanding the new security perimeter and stopping attackers on their tracks.
- Breaking through the noise and prioritising effective action.
- Understanding the multiple dimensions of security exposure to take a preventive approach.

Nicolas Corrarello
16:00
The Top 3 most debated topics of the day
16:30
GADGETS, GADGETS, GADGETS Lottery
17:15
By invitation Only Dinner
Book Your Ticket Now

€980.00

€1,970.00