Event Agenda
2-3 March, 2027 // Copenhagen
2-3 March, 2027 // Copenhagen
We are currently working on the 2027 agenda.
In the meantime, take a look at the topics and themes discussed as part of the previous programme:
| Day 2 // 3rd March, 2027 07:45 – 16:00 |
|
![]() |
07:45Registration and Coffee |
![]() |
08:20Opening Address : Christer Wejke, BISO, Thomson Reuters |
![]() |
08:30Panel Discussion: People Power: How Do We Leverage the Human Factor to Mitigate Cyber Risk? Cyber threats are constantly evolving, and while technology plays a vital role in our defence, the human factor remains the greatest asset – and source of risk – in our network. In this panel discussion, we look at how understanding human strengths and weaknesses can significantly mitigate cyber risk, and how the security leader can leverage this. . • How do we empower employees to make better informed decisions and become the first line of defence? • Are our security measures truly user-friendly? Do they promote positive security behaviours? • How does GenAI fit into this question, and what should our policy be on employee use of chatbots? . – Moderator: Thomas Hassing Huge, Senior IT Risk Manager, Saxo Bank – Jonas Helweg-Mikkelsen, Senior Security & Compliance Officer, Nordic RCC – Søren Hansen, Global Director, Cybersecurity & Compliance, ECCO – Ilter Onder Aptula, Lead Information Security Engineer, Klarna – Tor Auster, IT Security Specialist . |
![]() |
09:30Case Study: Pen Test Insights: Aligning with NIST CSF 2.0 for Risk Quantification Unlock the true value of your penetration testing efforts. In this session, we demonstrate how to map pen test results directly to the NIST CSF 2.0’s functions and categories, enabling a clearer understanding of your organisation’s security posture. . • Learn actionable strategies for quantifying identified risks • Prioritise remediation efforts for a more resilient defense • Effectively communicate cyber risk to stakeholders . – Anders Björklund, CISO, Martin & Servera . |
![]() |
10:10 Break & Networking |
![]() |
11:00Presentation: Stronger Together: Building a Team Capable of Overseeing IT and OT Security IT/OT convergence has brought about unprecedented opportunities and challenges. To achieve balance, it is essential to have a robust and dynamic team capable of overseeing the security of both domains. But how should leaders go about assembling such a team? In this session, our expert speaker shares their insight. . • Play to the strengths of those within your organisation to maximise security • Take a holistic view of your team and your security • Set boundaries and priorities to make sure everyone is working towards the same goal . – Malonie Guha, CISO, SKF Group . |
![]() |
11:30Panel Discussion: Fractured World, Fragmented Security: How Will the Changing Geopolitical Landscape Impact the Relationship with Our Third-Party Partners? The world is experiencing a period of significant geopolitical change, with increasing polarisation and conflict. What direct impact will these shifts have on Nordic cyber security, specifically with the relationship with our partners? In this panel discussion, our experts will discuss the current landscape, the changes that lie ahead, and what actions we can take now. . • With the US’s changing global outlook, how should we manage our relationship with American third party partners? • What considerations should be taken into account when beginning new relationships, particularly with foreign third parties? • How do we navigate the complexities of data localisation requirements and potential conflicts with our global data security policies? . – Moderator: Daniel Norman, Regional Director, EMEA, Information Security Forum – Sune Aggergaard Mortensen, CISO, Danish Centre for AI Innovation (DCAI) – Rune Ören Skarphagen, Head of Information Security & GDPR | DPO, Play’n GO . |
![]() |
12:00Lunch Sponsored by KnowBe4 |
![]() |
13:00Presentation: Unlocking Business Value: Strengthening Data Protection through Effective Data Governance In this session, we demonstrate how a proactive and well-implemented data governance strategy can be a catalyst for significant data protection benefits. By strengthening data protection, you’ll not only safeguard your reputation and avoid costly breaches but also gain deeper insights from cleaner, more reliable data, leading to better products, services, and customer experiences. . • Turn data governance into a driver of innovation and, ultimately, increased business value • Ensure regulatory compliance and enhance security while improving data accuracy . – Vida Ahmadi, Data Governance Officer, Electrolux Professional Group . |
![]() |
13:30 Presentation: Secure and Smart Hospitals: Safeguarding Healthcare in the Cyber Age Smart hospitals promise revolutionary advancements in patient care, operational efficiency, and medical research. But digital transformation also introduces complex cyber security challenges that threaten the safety of healthcare systems. In this session, we delve into the evolving threat landscape targeting hospitals, and outline proactive strategies and best practices for building resilient and secure healthcare environments. . • Implement advanced encryption, access controls, and privacy-by-design principles • Address the unique risks of connected devices and ensuring their integrity • Learn how security awareness is boosted within a healthcare environment • How do a changing threat environment impact our thinking around cyber- and physical security (all security domains) . – Torkel Thune, Head of Department – Architecture, Operational IT Security/CSO, Oslo University Hospital . |
![]() |
14:00Break & Networking |
![]() |
14:30Roundtables: Choose 1 of the 2 Following Discussions T1: Insider Threats: What Are We Missing? – Andy Dyrcz, Information Security Officer, Dreamdata . T2: Are We Doing Our DevSecOps Right? – Steen Wilken, Head of Information Security Northern Region, Karnov Group . |
![]() |
15:10 Group Discussion: How can Organisations Balance the Need for Robust Security with User Convenience and Productivity? Join this interactive group discussion session with the whole audience with our expert moderator as we consider these questions. . • How can organisations balance the need for strong authentication with the desire for a seamless user experience? • What are the best practices for educating and training employees on security best practices without overwhelming them? • What are the key factors to consider when designing user-friendly security systems? • How should we respond to complaints about downtime for security updates? • What are the future trends in cyber security that organisations should be aware of? . – Andy Dyrcz, Information Security Officer, Dreamdata . |
![]() |
15:50 Closing Remarks : Christer Wejke, BISO, Thomson Reuters |
![]() |
16:00End of Conference |