12th of May – We are back LIVE! –  at Stockholm International Fairs – Learn More

The sum of all fears

Together never felt so good.

27 January 2022

Speakers are what makes our event stand out.

We frequently update our speaker list, subscribe to our event announcements and stay updated!

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Sameer Sait

Chief Information Security Officer, Amazon (WFM)

Brian Yap

Head of Blockchain Security, Crypto.com

Albin Zuccato - CISO of ICA Gruppen speaking at sum of all fears

Albin Zuccato

Chief Information Security Officer, ICA Gruppen

Peter Farendahl

CIO, Swedish Royal Court

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Patrick Andresson

CIO, Stora Enso

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Ola Ponten

CISO, SCA Forest Products

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Jonas Gavelin

CIO, Bankgirot

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Harri Hautala

Cyber Security Specialist, Handelsbanken

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Jacob Schlawitz

CIO/Group CEO, Max Matthiessen

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Liudas Alisauskas

CISO, ConnectPay

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Martynas Savickas

CISO, SEB Bank

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Rudy Dordonne

Head of Information Security, Lowell

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Navaz Sumar

CISO, TF-Bank

Elpidoforos Arapantoni

Chief Product Security Officer, eCarX Europe

Sireesha Dandu

Head of Enterprise & Product Cyber Security, Zenseact

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Torbjörn Larsson

CIO, Falkenbergs kommun
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Peter Hampus

CIO, Nackademin

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Thomas Dahlbeck

Chief Information Security Officer, Internetstiftelsen
Svante Nygren - Speaker at Nordic IT Security 2021

Svante Nygren

CISO and Head of unit, Information and Cyber Security, Svenska kraftnät

Sum of all fears edition

27th January, 2022

8:00

The Power Breakfast by Operrakällaren & The Chairman’s address

8:45

In Conversation With 1 - "Identity as the new security perimeter"

In today’s corporate environments, employees are accessing a variety of services using multiple devices while working across time-zones and with 3rd parties that are tightly integrated into core business activities. Identity is the only mechanism that can both enable organizations to secure resources while giving end-users the convenience and ease-of-use they seek.

Sameer Sait - Former CISO at Amazon

Sameer Sait

Chief Information Security Officer, Amazon (WFM)

9:10

Expert Panel 1 - Evolution of Ransomware, the Journey from being the monkey to the Human!

  • Commodity ransomware
  • Human-Operated Ransomware
  • Ransomware Brands
  • Preventing Ransomware Attacks
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Peter Hampus

CIO, Nackademin

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Ola Ponten

CISO, SCA Forest Products

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Patrick Andresson

CIO, Stora Enso

Albin Zuccato - CISO of ICA Gruppen speaking at sum of all fears

Albin Zuccato

Chief Information Security Officer, ICA Gruppen

9:40

Keynote 1 - To Be Announced

  • To Be Announced

10:00

Roundtable discussion 1

10:20

Coffee Break

10:40

Live Hack: Securing privileged access to stop attackers in their tracks - Keynote 2

See why endpoints are the favoured targets of attackers in this live hack simulation, and how cyber criminals use compromised credentials to escalate privileges and access your cloud applications.

Join Thycotic Chief Security Scientist, Joseph Carson, as he demonstrates how an attacker captures an employee password on an endpoint, gets hold of an email account, and escalates the exploit to access a critical cloud application—all undetected by typical security controls. Then, see how you can stop these endpoint attacks and protect privileged access to critical cloud applications with PAM security solutions.

What will you learn?

  • The favoured techniques and tools for compromising employee credentials
  • How an attacker escalates privileges to gain access to cloud apps
  • What you can do to shut down attacks before they escalate

Get the answers to these important questions

  • Who is most at risk for credential compromise?
  • How do I align PAM tools to my application security priorities?
  • What’s the best way to enforce least privilege for cloud apps?
Sameer Sait - Former CISO at Amazon

Jospeh Carson

Chief Security Scientist & Advisory CISCO, Thycotic

11:00

Keynote 3 - To Be Announced

  • To Be Announced

11:30

Expert Panel 2 - Zero day vulnerability exploits within the Fintech industry!

  • We all know the vulnerability management market is growing rapidly, is it good news or bad news?
  • Prediction is the way to nullify the zero day threats! If these threats are not addressed and mitigated, what is expected?
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Martynas Savickas

CISO, SEB Bank

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Jonas Gavelin

CIO, Bankgirot

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Harri Hautala

Cyber Security Specialist, Handelsbanken

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Liudas Alisauskas

CISO, ConnectPay

12:00

The Lunch by Operakällaren

13:00

Cryptojacking! - In Conversation With

  • How does cryptojacking work?
  • Attackers hurting where it hurts the most for an organisation, their customers! How do you suggest preventing this?

Brian Yap

Head of Blockchain Security, Crypto.com

13:20

Expert Panel 3 - What are the consequences of SQL injection?

  • What is the best defense from your perspective?
  • What can SQL Injection do?
  • Add, modify and delete data, corrupting the database, and making the application unusable, what does that to an organisation?
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Jacob Schlawitz

CIO/Group CEO, Max Matthiessen

13:50

Keynote 4

14:10

Expert Panel 4 - The rise in cyber risks in the new hybrid work environment

  • Discovery of hybrid working environments! With increased cybersecurity risks for organizations it is vital to understand how we can prevent those threats?
  • Pros and cons of hybrid work environment
  • What does the future look like?
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Rudy Dordonne

Head of Information Security, Lowell

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Torbjörn Larsson

CIO, Falkenbergs kommun
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Thomas Dahlbeck

Chief Information Security Officer, Internetstiftelsen
Eva Throne-Holst - Speaker at Nordic IT Security 2019

Daniel Olsson

CIO, Capio Sverige

14:40

Round Table Discussion 2

14:40

Coffee Break

15:20

Expert Panel 5 - Fake news creating real trouble! Social Media Disinformation and Spoof Accounts

As we know every business and organisation has increased the use of social media activity tremendously, especially during this pandemic hence attackers taking the opportunity to cause damage to the organisations.

  • How to analys, predict and take effective action in order to put a stop to these attacks?
  • Who is responsible for the security? Cyber security team, IT team or organisation as a whole?

Peter Farendahl

CIO, Swedish Royal Court

Eva Throne-Holst - Speaker at Nordic IT Security 2019

Navaz Sumar

CISO, TF-Bank

Svante Nygren - Speaker at Nordic IT Security 2021

Svante Nygren

CISO and Head of unit, Information and Cyber Security, Svenska kraftnät

Elin Ryrfeldt - Speaker at Sum Of All Fears 2021 Cyber Security Conference

Elin Ryrfeldt

Informationssäkerhetschef (CISO), Axfood

15:50

Expert Panel 6 - Automotive and Transportation industry, a ransomware attack, who will pay the cost?

The paradigm in the automotive industry has changed in the past 15 years. Drive by wire, steer by wire or in general x-by-wire technology is the panacea nowadays. As we dive into the electronics and software world, the fear as it has presented in the Fast and Furious 8 – the fate of the furious fleet wide attack can become a reality. In FF8 hackers managed to hack and transform multiple cars into “zombies” and remotely control them.

In a not that extreme example, a possibility of a ransomware attack is a reality in the automotive industry, at least in the infrastructures and in the backend systems of some automotive companies. However what if the attack takes place onboard (in the vehicle)? Attackers can stop you from using your car unless you pay a ransom? A cross-industry effort is required in order to set up the correct frameworks.

  • Who will pay the cost?
  • What type of regulatory frameworks does the industry need?
  • How can we draw the line of liability?
  • Are there societal aspects that we need to consider?

Elpidoforos Arapantoni

Chief Product Security Officer, eCarX Europe

Sireesha Dandu

Head of Enterprise & Product Cyber Security, Zenseact

16:20

One for the road by The Royal Opera House

16:30

The Top 3 most debated topics of the day

17:00

Lottery

18:00 – 20:00

By invitation Only – The Networking Dinner by Operakällaren

Apply for ticket