Event Agenda
2-3 March, 2027 // Copenhagen
2-3 March, 2027 // Copenhagen
We are currently working on the 2027 agenda.
In the meantime, take a look at the topics and themes discussed as part of the previous programme:
| Day 1 //2nd March, 2027 07:30 – 17:00 |
|
![]() |
07:30Registration & Coffee |
![]() |
08:40Opening Address : Christer Wejke, BISO, Thomson Reuters |
![]() |
08:50Panel Discussion: Uniting IT: Prioritisation & Collaboration Between IT Security and the Wider IT Team Achieving alignment with all sides of the IT department is a task easier said than done. From the CIO to the CISO, conflicting priorities can lead to difficulty and inefficiency. In this expert panel discussion, we bring together voices from different sides of IT to explore the critical importance of fostering strong collaboration and alignment between IT Security and the broader IT team. . • What are the negative impacts of disjointed communication and conflicting priorities between security and other IT functions? • What strategies for improving communication and knowledge sharing have proven effective? • How do we integrate security considerations into all stages of the IT lifecycle? . – Moderator: Janni Lee Bang Brodersen, CISO and Head of Governance, Risk & Compliance, University of Southern Denmark – Maya Retzlaff, Director of Cyber Resilience, Pandora – Victor Sedin, Vice President, Security Architecture, Wedbush – Mads Vaagland, CISO, Nortura . |
![]() |
09:30Government Fireside Chat: Protecting the North: Understanding the Nordic Cyber Security Landscape The Nordic countries are at the forefront of digital innovation, but also face evolving cyber threats. In this fireside chat session, a representative from the Danish Centre for Cyber Security, now known as SAMSIK – the Public safety Agency, will delve into the region’s cyber security landscape, examining national strategies, public-private partnerships, and the unique challenges of protecting a highly connected environment. Together with our moderator, we will learn about the collaborative approach that defines Nordic cyber resilience. . • Hear what lies ahead for Nordic cyber security in this ever changing global environment • Discover what collaborative efforts are being undertaken to bolster Nordic cyber resilience • See how the public sector is supporting business in their security, and what industry can do to support national cyber security efforts . – Moderator: German Fischer, Regional Cyber Security Incident Manager, Verisure – Annilisa Arge Klevang, Chief Information Technology Security Officer, SAMSIK – the Public Safety Agency . |
![]() |
10:00Presentation: From Compliance to Capability: How NIS2 Reshapes Detection and Response Strategy The NIS2 Directive introduces a new era of accountability for cybersecurity operations, with heightened expectations on how organizations detect, respond to, and recover from cyber threats. This session explores the practical implications of NIS2 for security teams and leaders, especially in aligning detection and response workflows with regulatory expectations, without overwhelming existing teams or budgets. . • Understand how NIS2 expands obligations around monitoring, detection, and incident handling. • Learn how to build workflows that align with both compliance and operational resilience. • Discover strategic ways to collaborate across teams and with trusted partners to meet NIS2 requirements efficiently. • Identify leadership actions that turn compliance pressure into an opportunity for security maturity. . – Marvin Ngoma, Principal Cybersecurity Specialist Lead, Nordics, Elastic . |
![]() |
10:30Break & Networking |
| TRACK A Chair: Christer Wejke, BISO, Thomson Reuters |
|
![]() |
11:10Presentation: Strengthening Digital Resilience: Aligning Digital Forensics and Cyber Security Strategies to Reduce Risk Organisations face increasing challenges in detecting, responding to, and quickly recovering from cyber attacks. Digital forensics and incident response (DFIR) teams are essential to reducing the impact of incidents. However, their potential is often undervalued due to limited integration with broader cyber security strategies. Join Magnet Forensics as they share actionable insights on bridging the gap between DFIR teams and security and organisational objectives. . – Laura Carey, Solutions Consultant, Magnet Forensics . |
![]() |
11:40Presentation: The AI Era: How Do We Prepare Our Industries for Further AI Regulation? The EU AI Act is poised to transform the development and deployment of artificial intelligence. This begs the question of where AI regulation is heading and what we need to know now. In this expert presentation session, we will delve into the Act’s core principles and its potential impact on security. We will also look ahead to a future with increased regulation of AI to identify and anticipate trends. . • What steps do we need to take now to make sure our organisations are compliant with the AI Act? • How do we assess our categorisation under the AI risk assessment? • What trends can we identify in AI regulation, and are there any preparations we can make now? . – Patrick Van Eecke, Global Co-Chair Cyber Data Privacy Practice, Cooley LLP . |
| TRACK B Chair: Anders Björklund, CISO, Martin & Servera |
|
![]() |
11:10Presentation: Securing Digital Identity with Advanced Fraud Prevention, Risk Management & Threat Intelligence in the CIAM Era In today’s hyper-connected digital economy, Customer Identity and Access Management (CIAM) has evolved into a critical security frontier. As organisations expand their digital services, they face an escalating threat landscape targeting consumer identities, which are now prime assets for fraudsters and cybercriminals. This session explores the convergence of advanced fraud prevention, dynamic risk management, and real-time threat intelligence as the foundation for securing digital identities in the CIAM era. . – Mark Van Der Horst, Director Digital Identity, PwC – Gagan Delouri, Senior Principal Solutions Engineer, Ping Identity . |
![]() |
11:40 Case Study: Risk Factors: Getting the Most Out of Your Penetration Testing Penetration testing is a crucial part of any robust security strategy, but are you maximizing its potential? In this session, we delve into the key risk factors that can impact the effectiveness of your penetration tests, from scoping and methodology to reporting and remediation. Learn how to identify and mitigate these risks to ensure you’re getting the most accurate and actionable insights from your security assessments. . • Find out what unknown influences there are on vulnerability discovery • Learn practical strategies to refine your penetration testing process • Generate actionable insights that strengthen your security posture . – Sabna Sainudeen, Director of Application Security, Carlsberg Group . |
| Plenary | |
![]() |
12:10Presentation: Three Mistakes You Are Making in Your Security Awareness Program - Simple Changes to Maximize Return CTI is a must-have in the fight against adversaries, but threat intelligence comes in many forms and can serve a wide range of use cases, so security teams often don’t know where to begin. In this session, we explore the threat intelligence journey to help you put CTI into context and incorporate actionable intelligence into your security programme. . – Xandra Uth, Account Executive Nordics, SoSafe . |
![]() |
12:20Lunch hosted by Elastic |
![]() |
13:10Presentation: The Trust Crisis As deepfakes, synthetic identities, and trusted platforms are increasingly exploited, trust has become an active attack surface. Zero Trust must evolve into a continuous and contextual model that reassesses trust across users, devices, content, and data. From LOTS attacks to agentic AI and quantum disruption, this session explores how rapid technological advancement is driving the evolution of Zero Trust, and how data security fabrics enable adaptive defense, reinforcing its role as the foundation for a resilient and trusted digital future. . – Tony Fergusson, CISO in Residence, ZScaler . |
| TRACK A Chair: Christer Wejke, BISO, Thomson Reuters |
|
![]() |
13:50Presentation: Weathering the Storm: How to Prepare for and Recover from Cyber Attacks There has recently been an increased focus on cyber resilience: our capacity to weather the effects of a cyber attack with as little impact as possible. This session equips you with the knowledge and tools to navigate these digital storms, focusing on both preparation and recovery strategies. We will explore how to identify weaknesses in your systems and networks, ensuring that, when the time comes, you will be ready to face up to almost any cyber storm. . • Learn essential security measures like firewalls, data encryption, and employee training • Develop a comprehensive incident response plan • Explore strategies for swift recovery and data restoration to minimise disruption and financial impact • Analyse attacks and strengthen your defences to prevent similar incidents in the future . – Andreas Bergqvist, CISO/Chief Security Officer, Finansiell ID-Teknik – BankID . |
![]() |
14:20Presentation: Cyber Resilience = Prevention + Recovery In this session, we redefine cyber security from a static defense to a dynamic, integrated strategy for the modern digital landscape. The equation “Cyber Resilience = Prevention + Recovery” is the central theme, highlighting that true organisational strength comes not just from stopping threats, but also from the ability to withstand, respond to, and quickly recover from a cyber incident. . • Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate • Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption • Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events . – Salvatore Buccoliero, SaaS and Security Technical GTM EMEA, Rubrik . |
| TRACK B Chair: Anders Björklund, CISO, Martin & Servera |
|
![]() |
13:50Presentation: When the Voice You Trust is Fake: How Adversaries Weaponise AI In this session, we explore the rapidly evolving and dangerous landscape of AI-generated content, focusing specifically on voice cloning, or vishing. Including a real-world case study, we will cover the psychological impact of these synthetic realities, discussing how they exploit our cognitive biases and erode our ability to discern truth from fiction. . • Gain a forward-looking perspective on how we can build resilience against these threats • Get the latest on emerging detection technologies and the challenges of regulation • Engage in a discussion on how best to respond to the growing threat AI poses to information security . – Anders Björklund, CISO, Martin & Servera . |
![]() |
14:20Presentation: Agentic AI: Transforming Threat Intelligence from Data to Action Traditional threat intelligence often overwhelms security teams with a flood of static data, making it unsustainable to manually validate and prioritise threats. As adversaries grow more sophisticated and automated, a new approach is needed. This session will explore how threat intelligence, combined with agentic AI, is revolutionising threat intelligence with its ability to reason and automate tasks. Learn how AI agents can move beyond simple data feeds to provide autonomous, decision-ready insights. Organisations can shift from reactive security to a truly proactive cyber defense posture by automating key workflows like contextual enrichment and alert prioritisation. . – Samet Sazak, Senior Solutions Engineer, SOCRadar . |
| Plenary Chair: Christer Wejke, BISO, Thomson Reuters |
|
![]() |
14:50Break & Networking |
![]() |
15:30Roundtables: Choose 1 of the 3 Following Discussions T1: How To Adjust Your PAM Strategy for Growth – Jaens Stafren, Cyber Security Principal, Keeper Security . T2: The AppSec Maturity Trap (And How to Overcome It) – Nashat Amer, Application Security Specialist, Ox Security . T3: DDoS & Credential Stuffing: Cheap Attacks, Big Risks – Nils Boman, Senior Solutions Engineer, Fastly . |
![]() |
16:10Panel Discussion: Under Pressure: Dealing with Stress and Well-being while Working in Cyber Security As the guardians of their organisations’ digital assets, security professionals often find themselves under immense pressure to protect against ever-evolving threats. This constant stress can take a toll on their mental and physical well-being. In this panel session, our expert speakers, together with our moderator, will explore the unique challenges we face in cyber security, the impact of stress on their health, and practical strategies for managing stress and promoting well-being. . • What are the specific pressures and responsibilities that contribute to stress? • What impact can poor work-life balance have on cyber security? • What practical techniques can be used for reducing stress, while staying on top of organisational security? . – Daniel Norman, Regional Director, EMEA, Information Security Forum – Frederik Braun, Cyber Assurance Manager, Ingka Group, IKEA – Saqib Shabbir, Director – Information Security Operations, Mastercard – Sabrina Jensen, ISO, Too Good to Go . |
![]() |
16:50Chairman’s Closing Remarks : Christer Wejke, BISO, Thomson Reuters |
![]() |
17:00Drinks Reception |