Assume Breach & Shield your Core

Calendar Icon

20/11/2024

Clock Icon

10:00-16:30

Map Pin Icon

Clarion Hotel Sign

November 20th - Hybrid Event

Agenda

Theme

Data Under Attack Icon

The Threat Landscape and Strategic Leadership

10.00

James Hughes (US)
VP SE & Enterprise CTO EMEA
Rubrik
Opening Remarks

How to Prepare and Respond to the Threat Landscape in 2025

  • Cyber threat picture in recent years and what to expect from the future
  • Global Shifts and Geopolitical Dynamics in Cybersecurity
  • Emphasizing the role of leadership in navigating cyber challenges

10.25

Robert Mungenast
Group CISO
Electrolux

Cyber in the Boardroom

  • What emerging threats organisations are probably not thinking about but should
  • Board reporting and risks: Cybersecurity is never just a technology problem, it’s a people, processes and knowledge problem
  • Is your Strategy Plan compliant with the requirements, reduces the security gaps and responds to various relevant threats while ensuring everyone contributes their part of improving the organisation’s security posture

10.45

Cónal Hickey (IRE)
Vice President and Global Cyber Resilience Leader
Kyndryl

Insights for 2025 and Beyond: Understanding Modern Cyber Threats

  • Proactive Strategies for an Unpredictable Threat Landscape: A deep dive into recent trends and how cyber threats have evolved, informed by the latest findings
  • How global changes are expected to shape the next wave of cyber risks.
  • Why forward-thinking leadership and informed decision-making is critical to staying ahead of emerging cyber threats

11.05

James Tucker (US)
Head of CISO International
Zscaler

Zero Trust Architecture: From Concept to Reality, Adding Negative Trust to the Equation

  • Steps to implement Zero Trust principles to counter new digital business risks
  • The evolution of Zero Trust, and why Negative Trust is needed
  • Managing Zero Trust security models and the benefits of Deception Technology

11.25

John Spencer (UK)
Sales Engineering Director
CrowdStrike

A Panda, a Spider and a Bear Walk into a Bar...

  • Insight into the evolving Threat Landscape from Nation state to eCrime
  • Understand how adversaries have rapidly accelerated time to impact
  • Why is Cloud the new hunting ground

11.40

Greg van der Gaast (UK)
Friendly Hacker

Better Security through Better Business

  • Why risk management isn’t sustainable
  • How quality management can reverse the security spiral
  • How security can define and streamline business process to increase the bottom line

12.00-13.00

Lunch

Theme

Threat Landscape Icon

Your Data is Under Attack - Be Prepared for the Worst Case Scenario

13.00

Andreas Bergqvist
CISO
BankID

Social Engineering - Combatting DeepFake and Misinformation Threats

  • Preparing your team for the perfect storm. Identifying and mitigating the risks of deep fakes and misinformation campaigns
  • Business Continuity and Disaster Recovery (BCDR) resilience in multiple-cyber-event scenarios
  • Counterintelligence training for teams in withstanding social engineering related attacks using behavioural science and exploiting human psychology and our emotions

13.15

Per Gustavsson
CISO Lead
Stratsys

Digital Transformation of Cybersecurity

  • Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML
  • Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots
  • Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response

13.35

Joshua Crumbaugh (US)
Ethical Hacker

Think Like a Hacker

  • The future of cybersecurity and how resilience can be achieved with adaptability and innovation
  • Understanding how cybercriminals operate has never been more essential for businesses and governments looking to defend themselves
  • Using hacking-for-hire services - Reproduce common hacking methods in your own environment to test your own defenses, and your people

13.55

Godwill N'Dulor (UK)
Senior Security Strategist
Fastly

Rebuilding Trust. Long-Term Impacts of Cyber Attacks on Business

  • Cyber attacks have a lasting impact on businesses
  • The true cost - beyond system downtime and availability to trust and reputation
  • Discover unique research insights and hear how 1500 global IT leaders navigate the evolving threat landscape in 2024

14.10

Andre Troskie (SA)
EMEA Field CISO
Veeam

Take Control in a World of Uncertainty

  • A cyber storm is gathering – what are the major factors that increase risk?
  • With increased risk comes increased expectations – what are the most important objectives and control drivers?
  • How can you build an efficient cyber strategy that results in better outcomes?

14.30-15.00

Networking Break

Theme

Human Centric Icon

Business Security Culture & Human Centric Strategies

15.00

Kristoffer Sjöström
CSO
SEB
Jørgen Floes
VP and DE, Resiliency & Security Lead
Kyndryl

Prepare to Comply. DORA and NIS2 Directives are only 41 Days Away!

  • Explore the DORA and NIS2 directives and how to ensure operational resilience in the face of digital threats.
  • The similarities and differences between the two new EU data regulations, affecting nearly every company despite their official scope
  • Effective strategies for DORA compliance and necessary steps your organization should take to achieve compliance and enhance security.

15.20

Andrew Rose (UK)
CISO
SoSafe

A People-Centric View on Security

  • The continued importance of training and testing your staff
  • How to enable and educate the workforce in an era of Cloud, Digital Trust and Artificial Intelligence
  • An individual CISO or security team is not enough to keep your system safe – security is a priority for all
  • Addressing insider threat – often security’s main pain point

15.40

Magnus Sletteng
Co-Founder Commvault Nordics, Principal Systems Engineer
Commvault
Magnus Ling
Storage Sales Specialist
HPE

From Attack to Recovery

  • Lessons learned from recent high-profile attacks
  • To pay or not to pay? In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services.
  • Recover from Ransomware: Whether you chose to pay the ransomware or not, how to treat your entire network as contaminated goods

15.55

Martijn Katerbarg
Compliance Engineer
Sectigo

Quantum Computing. Disruptive Challenges to Cryptography

  • Upcoming PKI industry changes and impact of shorter certificate lifespans
  • Building robust Certificate Lifecycle Management strategies
  • Preparing for the inevitable. Adapting to emerging security challenges
  • Begin preparing for a shift to quantum-resistant security measure

16.10

Merle Maigre (EST)
Senior Expert on Cyber Security (ex Nato)
e-Governance Academy

Hybrid Operations in the Cyber Domain

  • Cyber operations, delusive information mixing the traditional boundaries by purpose
  • Cybersecurity and cyber defense are equally important in securing critical infrastructure. Private sector and public sector cannot be separated
  • What is your company role in the larger perspective? How cyber resilient are you?

16.30

End of Day

17.00

Strategy Talk Logo

Afterwork - Soho House Stockholm