Event Agenda

12th – 13th September 2024 // Copenhagen, Denmark

Register Now
Day 1 // 12th September 2024
08:00 – 17:30
08:00Registration & Coffee
08:50Chairman’s Opening Address
09:00Panel Discussion: Preparing for the Future: How Will NIS2 Impact Cross-Border Cooperation?

The NIS2 Directive is set to replace its predecessor in October. This marks an evolution in European cyber security regulation, imposing stricter obligations on critical sectors and expanding the number of industries included in its scope. This panel discussion delves into the potential impact of NIS2 on cross-border cooperation in cyber security, exploring both opportunities and challenges.
.
• How can we assess our preparedness for NIS2?
• What difficulties can we expect in its cross-border implementation?
• What impact will NIS2 have in unison with other upcoming regulatory changes?
.
09:40Presentation: To Visibility and Beyond! Preparing for NIS2 Compliance

EU Member states (and their close partners) will need to comply with the set policies of the NIS2 Directive this year. While all entities are subject to seven broad security requirements, stakeholders at businesses of all shapes and sizes are asking how they might be impacted by new regulations and reporting requirements.
NIS2 mandates any significant cyber incident must be reported within 24 hours of onset, adding details within 72 hours. When it comes to IT security, is your organisation prepared to recover from cyber incidents that impact process and business continuity? Can you determine your mean-time-to-recover if you are compromised? Join this session to hear the answers to these questions and more!
.
• Learn about compliance with the 7 broad security requirements for all entities
• Improve your incident reporting to meet requirements
• Reduce the severity of security incidents and harness the benefits of NIS2
10:20 Government Plenary Keynote: Fortress or Frontier? An Assessment of Nordic Cyber Security

The Nordic region is renowned for its digital maturity and positive sense of collaboration in cyber security. But in an ever-evolving threat landscape, the question remains: Are we truly prepared for modern day attacks? This presentation delves into the current state of Nordic cyber security, offering a comprehensive assessment of strengths, weaknesses, and emerging challenges.
.
• Hear the latest insight into the national cyber security posture for the Nordic countries
• Discover what the development of the Russia-Ukraine war means for us
• Bolster your threat intelligence by understanding changing threat techniques
.
Samuli Bergström, Director, National Cyber Security Centre Finland (NCSC-FI)
10:50 Break & Networking
TRACK A
11:30Presentation: AI, Cyber Security, and the Promise of Tomorrow: A Hacker's Insight

Since ChatGPT launched a year ago, the world has undergone a massive transformation, and the world of cybercrime is no different. But how does generative AI actually work for cybercriminals, and what can they do with this powerful new technology? Go behind the scenes with an ethical hacker, where you will learn:
.
• How attackers are using generative AI to increase their attack success
• Why WormGPT and other malicious LLMs will be a cause for (major) concern in 2024
• What you can do now to stay ahead of these threats—before it is too late
.
Abnormal Security
12:00Fireside Chat: What Does the Future Hold for AI in Cyber Security?

Artificial Intelligence is rapidly changing many things in the world, and cyber security is no exception. While many of us are excited about the future of AI, others will be more apprehensive. From AI-enabled cyber attacks to insider threats stemming from the use of Generative AI, the potential risks can seem overwhelming. Our expert for this fireside chat session will try to balance the opportunities and the risks that AI presents to use as we look ahead to what the future will hold for this incredible technology. There will also be a chance for audience members to ask our expert questions of their own.
.
• What are the main benefits of AI we can utilise in the short term?
• How can we best prepare for the major changes AI will bring?
• What should our approach to AI risks be?
.
Jörgen Mellberg, CISO, Inwido
12:30Presentation: The Impact of AI on Secure Coding

The launch of ChatGPT in November 2022 firmly shone the spotlight on the question: “what can AI do?” Well, an AI-based application like ChatGPT can answer questions in natural language and assist humans with many commonplace tasks like composing emails, writing essays, and even developing code. Wait! Code?! Can ChatGPT really write programming code? Yes, it can. But can it write secure programming code? No, it can’t. The code generated by AI-based code generators today is often insecure. The best way to make developers security-conscious is through hands-on secure coding training. In this session, we will delve into how you can do just that.
.
SecureFlag
TRACK B
11:30Presentation: Building Cyber Resilience in the Age of Targeted Attacks

As an experienced cyber security expert or CISO, you know that today’s cyber-attacks target people not infrastructure. Individuals within your company are singled out based not just on their role but also on the information they access and use. Such determined phishing attacks and cyber threats appear in your users’ email inboxes every day. So how can you make your business cyber resilient? And should the worst happen, how do you rapidly recover following an attack?
Join our expert as they share their expertise on pain points faced by CISOs and how to overcome them.
.
• Discover the latest trends from the threat landscape and how to build the cyber defences your business needs
• Learn cyber resilience best practices for achieving cyber security in 2024 heading into 2025
• Understand how to create a cyber security strategy with limited resources and an ageing technology stack
.
Magnet Forensics
12:00 Fireside Chat: Survival in the Digital Era: What Does a Culture of Cyber Security Look Like?

Building a strong culture of cyber security within our organisations is no longer optional; it’s essential for survival. But what does this culture look like? In this session, we speak to an expert security strategist who implemented a cultural change in their company. Join us to hear the results.
.
• Hear a first-hand insight into what a positive security culture looks like
• Cultivate an environment of communication and collaboration around security matters
• Use your voice as a security leader to champion awareness and responsibility
.
Sarah Aalborg, CISO, Tivoli
12:30Presentation: Enhancing Cyber Resilience - Lessons from the Past Year; Focus Areas for the Coming Year

Throughout the past year, organisations were tasked with achieving more while using the same or fewer resources to secure their business. Amidst challenges such as escalating business disruption; the continued increase in ransomware attacks resulting in paid ransoms, public shaming, or loss of trust; sophisticated social engineering attacks elevated by AI; and an escalating focus on supply chain vulnerabilities, the demand for amplified cyber resilience is unmistakable.
Join this session to unpack the lessons we should take from a tumultuous year, and where cyber security executives and practitioners should focus their efforts in the year ahead.
.
• Learn the global trends shaping the cyber security landscape
• Discover how to adhere to new compliance requirements and enhance reporting practices
• Focus your investments to help organisations elevate their security defences
Lunch
12:40Lunch
TRACK A
13:40Presentation: How to Use AI to Detect, Respond & Recover!

Smart IT leaders are now leveraging Artificial Intelligence to defend their digital assets, sensitive information, and their IT infrastructure from the latest wave of cyber attacks. In this session, we learn new strategies to protect your business with our expert speaker sharing the latest advancements in AI technology and how a holistic, managed security approach will strengthen vulnerability awareness, threat detection and incident response to stay one step ahead of increasing cyber threats. See how AI-powered services are redefining the landscape of cyber security!
.
SANS Institute
14:10Presentation: Are You Prepared? How One Company Successfully Implemented a Policy on GenAI Risks

GenAI is revolutionising industries, but its power carries potential security risks. Sensitive data leakage and policy violations are just a couple of the emerging threats. In this session, our expert speaker talks us through how they put together their company policy on GenAI and how it succeeded.
.
• Demystify GenAI and its potential security implications
• Explore the challenges faced when creating a GenAI policy and how you can overcome them
• Identify and assess the risks of GenAI to your specific industry
.
Jonas Rendahl, CISO, Aurobay
14:40Presentation: My Hybrid Identity has Been Hacked - What Now?

The cloud is seen as an additional security measure. But what happens if it has been compromised? The presentation session will show you how to restore your hybrid identity as quickly as possible and what security measures you can take in advance.
.
Oliver Keizers, Area Vice President EMEA Central, Semperis
TRACK B
13:40Presentation: Cyber Resilience in the Digital Age - It’s Not Just About Technology

As global investment in security technologies continues to grow so the scale and impact of cyber-attacks also grows. There seems to be something missing in our organisational resilience and our corporate response to growing cyber risks. Increasingly we are realising that resilience needs to be led from the boardroom, that our behaviours and culture is a vital part of an effective response and that we need the understanding, governance and assurance required to know that we’re focusing our time, money and limited resources in the areas that matter most to our organisation. Are you asking yourselves the right questions? Do you know where your greatest vulnerabilities lie to the particular cyber threats you face? Has your organisation developed an organisation-wide strategy and plan for preparing and responding to attacks when they happen? This session presents a simple roadmap for managing your resilience journey effectively based on real-life examples across the public and private sector.
14:10Case Study: Cyber Security is Not Enough: Achieving True Operational Resilience in the Digital Age

Cyber security measures are crucial, but they are not our only line of defence. In this session, we go beyond traditional security approaches to explore operational resilience, the ability to adapt and recover from disruptions, including cyberattacks.
.
• Discover why cyber security alone is inadequate in the digital age
• Learn the key components of operational resilience
• Hear strategies for building a resilient organisation, from proactive risk management to incident response and recovery
14:40Presentation: Overcome the IT/Security Divide & Get Awesome at Vulnerability Remediation

Businesses are increasingly adopting exposure management to better understand and proactively reduce overall cyber risk. With risk-based vulnerability management functioning as a core component of exposure management, we want to better understand how we can optimise the current state of vulnerability management. In this session, we hear from our expert speaker who will give key insights into vulnerability remediation
.
• Gain a crucial understanding of factors that impact vulnerability discovery, prioritisation and remediation
• Observe and improve the way IT and cyber security work together
• Learn the lessons from security leaders as they work to mature and optimise vulnerability management and transition to exposure management
15:10Presentation: Is Your SIEM Really Doing Its Job? How to Take Cyber Security to the Next Level

SIEMS are generally complex, slow, expensive, and underperform to expectations. In this session, our expert speaker will explain the challenges the modern SOC faces and a creative way to immediately correlate threats to your internal environment without compromising speed or cost.
.
• Learn how to search through petabytes of data going back up to 15 years in seconds
• Learn how to accelerate your analysts’ performance while reducing stress and overload
• See how you can immediately correlate your external threat environment to your internal telemetry
.
ZScaler
15:40Break & Networking
16:10Roundtables:

T1: How can Organisations Integrate Different Security Tools and Technologies Effectively?
Quest Software
.
T2: How can Organisations Collaborate More Effectively to Share Cyber Threat Intelligence?
Veracode
.
T3: What Role does AI Play in Security Defense Strategies?
.
T4: How can Organisations Ensure They have the Right Talent and Resources in Place to Manage Cyber Risks?
.
T5: What are the Long-Term Trends and Challenges Facing the Field of Cyber Security?
.
T6: What Emerging Technologies will Shape the Future of Security?
16:50Panel Discussion: How Should We Present Risk to the Board?

Risk is undeniably a vital component for understanding our level of resilience and capability to fend off on-coming threats. It is vital that those at the top of our organisation are in full understanding of our risk level in order to make an informed decision on resource allocation, strategy, and prioritisation, among other important matters. To help with this, our expert panellists discuss their methods for presenting risk to the board.
.
• How do we maintain focus on exactly what the board needs to know?
• How can IT professionals improve their communication skills?
• What are the common pitfalls when presenting risk to the board?
• How do we shift the perception of risk management to create understanding of the value added?
.
Frederik Rune Nielsen, Head of Security, Confidential
Mikael Wigh, Head of Cybersecurity G&C, Ecco
17:30Chairman’s Closing Remarks & Drinks Reception

Join the Line-Up

Submit a Proposal

Request a Brochure

Access Here

Register Now

Choose Your Pass