top of page
  • White LinkedIn Icon
Blue Pattern_edited_edited.jpg
CyberSec Light.png

Assume Breach & Shield your Core

20/11/2024

10:00-16:00

7A POSTHUSET

STOCKHOLM

NOVEMBER 20th - HYBRID EVENT

Agenda

Theme:  The Threat Landscape and Strategic Leadership

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

10.00

  • Cyber threat picture in recent years and what to expect from the future

  • Global Shifts and Geopolitical Dynamics in Cybersecurity

  • Emphasizing the role of leadership in navigating cyber challenges

OPENING REMARKS
HOW TO PREPARE AND RESPOND TO THE THREAT LANDSCAPE IN 2025

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

10.25

AI SHAPING THE ROLE OF FUTURE CYBERSECURITY STRATEGIES

  • How next-gen AI can be leveraged to predict, prevent and respond to emerging threats

  • AI in Cybersecurity: Opportunities, Privacy Concerns and Ethical Considerations

  • Practical strategies for integrating advanced AI technologies into existing framework

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

10.40

PREVENTING QUANTUM CYBERATTACKS - PREPARING FOR THE INEVITABLE

  • Strategies for adapting to quantum-related threats

  • Implications of Quantum computing and how it’s reshaping cybersecurity

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

10.55

AI-POWERED PHISHING DETECTION - PREVENTION & RESPONSE

  • Anomaly detection and response in network traffic using ML techniques 

  • Real-time malware classification with deep learning

  • Predictive analysis for emerging threats and how the generative AI era is shaping the future

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

SOCIAL ENGINEERING - COMBATTING DEEPFAKE AND MISINFORMATION THREATS

11.10

  • Preparing your team for the perfect storm. Identifying and mitigating the risks of deep fakes and misinformation campaigns

  • Business Continuity and Disaster Recovery (BCDR) resilience in multiple-cyber-event scenarios

  • Counterintelligence training for teams in withstanding social engineering related attacks using behavioral science and exploiting human psychology and our emotions

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

CYBER IN THE BOARDROOM

11.25

  • What emerging threats organisations are not thinking about but should

  • Board reporting and risks: Cybersecurity is never just a technology problem, it’s a people, processes and knowledge problem.

  • Is your Strategy Plan compliant with the requirements, reduces the security gaps and responds to various relevant threats while ensuring everyone contributes their part of improving the organisation’s security posture.

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

11.45-12.45

NETWORKING BREAK

Theme: Your Data is Under Attack - Be Prepared for the Worst-Case Scenario

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

12.45

THINK LIKE A HACKER

  • The future of cybersecurity and how resilience can be achieved with adaptability and innovation

  • Understanding how cybercriminals operate has never been more essential for businesses and governments looking to defend themselves

  • Using hacking-for-hire services - Reproduce common hacking methods in your own environment to test your own defenses, and your people

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

13.00

  • Why use time and money to prepare for a cyber security incident

  • How to stay cool, calm, and collected – and make intelligent decisions even during a breach

  • Know the steps you can take in the planning phase, during attack and in the post-production phase

ALERT! RESPONDING TO BREACH

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

13.15

DIGITAL TRANSFORMATION OF CYBERSECURITY

  • Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML

  • Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots

  • Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

13.30

RANSOMWARE DECODED: UNDERSTANDING AND PREVENTING MODERN RANSOMWARE & PHISHING ATTACKS

  • Why Does Ransomware Continue To Dominate The Threat Landscape

  • How to protect your business from ransomware and phishing scams. Exploring the future of ransomware attacks and how to future-proof your organisation.

  • Beyond Ransomware: NextGen complex RansomOps

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

13.50-14.20

NETWORKING BREAK

Theme: Business Security Culture & Human Centric Strategies

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

14.20

A PEOPLE-CENTRIC VIEW ON SECURITY

  • The continued importance of training and testing your staff

  • How to enable and educate the workforce in an era of Cloud, Digital Trust and Artificial Intelligence

  • An individual CISO or security team is not enough to keep your system safe – security is a priority for all

  • Addressing insider threat – often security’s main pain point

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

14.35

  • How to improve your supply chain resilience. Each day, organizations face new security, privacy, and compliance threats when working with third parties. 

  • Evolving strategies for securing the supply chain in a digital world. Data privacy and sovereignty in the modern Cloud.

  • Attacks, which often use ransomware, can impact thousands of organizations by targeting a single company. They can shock global supply chains with minimum effort

SUPPLY CHAIN AND THIRD-PARTY RISK MANAGEMENT

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

14.50

FROM ATTACK TO RECOVERY

  • Lessons learned from recent high-profile attacks

  • To pay or not to pay? In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services. 

  • Recover from Ransomware: Whether you chose to pay the ransomware or not, how to treat your entire network as contaminated goods

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

15.05

ZERO TRUST ARCHITECTURE: FROM CONCEPT TO REALITY, ADDING NEGATIVE TRUST INTO THE EQUATION

  • Steps to implement Zero Trust principles to counter new digital business risks

  • The evolution of Zero Trust, and why Negative Trust is needed

  • Managing Zero Trust security models and the benefits of Deception Technology

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

15.20

HYBRID OPERATIONS IN THE CYBER DOMAIN

  • Cyber operations, delusive information mixing the traditional boundaries by purpose

  • Cybersecurity and cyber defense are equally important in securing critical infrastructure. Private sector and public sector cannot be separated

  • What is your company role in the larger perspective? How cyber resilient are you?

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

15.40

END OF DAY

Yellow Angle 2_edited_edited_edited_edited_edited_edited_edited.png

17.00

STRATEGY TALK AFTERWORK SOHO HOUSE

bottom of page