Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.
0
Expert Speakers
0
Delegates
0+
Minutes Of Networking
Expert Speakers
We are delighted to introduce some of our expert speakers in cyber security. Our speakers are distinguished professionals in the field, with years of experience and a passion for sharing their knowledge.
• As an information security leader, you know that your organization is constantly under threat from cyber attacks. But have you considered the potential risks of artificial intelligence?
• Artificial intelligence is quickly becoming a powerful tool for cyber attackers, and without proper understanding of its capabilities and limitations, organizations may be vulnerable to devastating attacks. Additionally, the lack of regulations surrounding AI use lead to ethical concerns.
• As an information security leader, you have a responsibility to protect your organization from these risks. By understanding the capabilities and limitations of AI, you can better defend against potential threats and ensure that your organization stays ahead of the curve.
• Don’t let yourself fall behind in this new era of technology. Attend this session and stay ahead of emerging threats as well as ensure responsible usage within your organization.
• Many cybersecurity leaders are struggling to effectively communicate with management boards. Technical terms and jargon make it difficult for their message to be understood.
• This session will give you insight on how other leaders bridge the gap between technical and non-technical departments, establishing best practices for creating a more effective cybersecurity culture. Don’t miss out on the opportunity to improve communication within your organization.
• Establishing an effective cybersecurity culture can make all the difference in protecting your company from potential cyber threats.
• Take control of your organization’s cybersecurity future today by learning your peer’s experience. Improve communication and foster a stronger security culture within your organization.
When it Comes to Compliance you need to Juggle with many Regulations
• Are you still using dozens of spreadsheets for managing compliance for IT security and data privacy? It can be overwhelming.
• With so many regulations and standards to comply with, it can be overwhelming to manage it all. But ignoring compliance could lead to serious consequences for your organization.
• Be proactive in managing compliance by hearing best practices and advice on tools for day-to-day operations. Make sure your organization meets all necessary requirements to avoid loss of customer trust, reputation damage, or hefty fines.
• Get ahead of potential problems by attending this session. Ensure your area of responsibility is fully compliant.
• As a cybersecurity leader, you might be concerned about the impact of machine learning and AI on your team’s role in protecting your organization from cyber threats.
• The rise of machine learning and AI has sparked discussions on whether or not humans will be replaced in the cybersecurity field. This session dives deep into this topic and explores both challenges and opportunities that come with the shift towards AI-driven cybersecurity.
• As software development becomes increasingly automated, it’s more important than ever to understand the role of human factor in cybersecurity. This panel uncovers just how crucial human expertise is when it comes to protecting sensitive data from cyber threats.
• Gain valuable insights into the impact of AI on cybersecurity and learn how to leverage human expertise for optimal results. Start preparing for an AI-driven future now.
Johan Nordin
Director of IT & IS, Extada Retail
Anders Nørklit Thingholm
Global Information Security Officer, DANX Carousel Group
• Are Cybersecurity leaders really the right persons to take over yet another responsibility? If yes, how do they navigate the GDPR challenges?
• With the increasing number of data breaches and legal implications, it’s imperative for businesses to comply with GDPR regulations. Non-compliance can lead to heavy fines, loss of reputation, and even business shutdown. But where do you begin? What are the best practices, pros and cons when you have data protection on your table?
• This panel will equip you with updated strategies for data protection, including implementing data minimization and pseudonymization, data privacy agreements, and more. Join the panel on our journey towards complete GDPR compliance! Learn form your peers on their experiences in meeting GDPR requirements and ensure your customers’ and employees’ personal data is kept safe. Act by updating your data protection strategies and ensure compliance with privacy regulations.
Bernard Helou
Cybersecurity Manager, Schibsted News Media
Knud Kokborg
Global IT Compliance Manager, Falck
Scott Melnyk
CISO, Internationella Engelska Skolan Internationella Engelska Skolan
• In today’s rapidly evolving digital landscape, human error and social engineering remain persistent threats to organizational security.
• Let us explore how psychology, communication, collaboration, and behavior design can integrate to mitigate human risk effectively. Discover the profound impact of psychological insights on shaping secure behaviors, cultivating a security-aware culture, and empower employees to become an active line of defense against and social engineering attacks.
• This holistic perspective equips CISOs to navigate board-level discussions on human risk and strategically elevate resilience. Join us as we examine how this integrated approach can transform human risk mitigation and improve security.
• You are certainly looking to stay ahead of the curve when it comes to supply chain security. You need to mitigate risks associated with third party code and protect your software supply chain in today’s threat landscape.
• As threats continue to emerge and evolve, it’s critical for leaders like yourself to remain informed on new strategies, emerging trends, future predictions on software security across various industries. That’s why this session is essential for staying up-to-date.
• This comprehensive analysis covers topics from mitigating risks associated with third-party code to analyzing future predictions and trends. We’ll also explore software supply chain security across various industries, so you can compare your experience with the latest strategies.
• Stay informed and take action by attending this keynote. Compare experience shared in this session with your experience and gain an edge in protecting your organization from potential breaches.
Filip Nowak
Global Head of Cyber Defence, Ferrero
Delegates
VOLVO
CISO
ING Bank
Product Owner
SpareBank
CISO
DNB Bank
Head of IT security
Booking.com
Program Leader
SpareBank
CISO
Einride
CISO
ING Bank
Product Owner
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
SpareBank
CISO
VOLVO
CISO
Bravida
CISO
Booking.com
Program Leader
VOLVO
CISO
ING Bank
Product Owner
Booking.com
Program Leader
SpareBank
CISO
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
VOLVO
CISO
ING Bank
Product Owner
DNB Bank
Head of IT security
SpareBank
CISO
Booking.com
Program Leader
Einride
CISO
SpareBank
CISO
ING Bank
Product Owner
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
VOLVO
CISO
ING Bank
Product Owner
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
Highly Exclusive. Operakällaren’s name dates back to 1787 when it was situated in the cellar under Gustav III’s opera house. History permeates the atmosphere in this heritage property, the most prestigious meeting place in Stockholm, is a house filled with opportunities, inspiration and fantastic networking.
Free Subscription
The most comprehensive Cybersecurity agenda for leading industry executives
Connect and share niched and unique knowledge
Meet our 15-year experience in addressing international cybersecurity challenges