Agenda
08:00 - 08:50 |
Breakfast Networking |
08:50 - 09:00 |
Chairs Welcome |
09:00 - 09:20 |
► Learning from retail: adapting to the increasing sophistication of cyber criminals and the concerns of customers George Mudie, Chief Technology Risk Information Officer, H&M Group
|
09:20 - 09:40 |
► AI-Powered Cyber Defence: Transforming Cybersecurity in the Digital Age Dominik Bieszczad, Senior Solutions Engineer, Censys
|
09:40 - 10:00 |
► The Imbalance of Cyber Security Thomas Berglund, Director, Technical Account Management, Tanium
|
10:00 - 10:25 |
► Third party security: there must be a better way! Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
10:25 - 11:00 |
►Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Fireside chat: A CSO's view... Kristoffer Sjöström, CSO & Head of Group Security & Cyber Defense, SEB
|
11:50 - 12:10 |
► Achieving Cyber Resiliency by Combining Posture and Recovery Filip Verloy, Field CTO EMEA & APJ, Rubrik
|
12:10 - 12:45 |
►Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
12:45 - 13:45 |
Lunch |
13:45 - 14:05 |
► Financial sector’s conditions and challenges in cyber security and crisis preparedness Magnus Jacobson, Senior Adviser Cyber security, Swedish Bankers’ Association
|
14:05 - 14:25 |
► Cybersecurity 112 Amanda Spångberg, Account Manager, Integrity360
|
14:25 - 14:45 |
►Everything, Everywhere, All At Once. James Tucker, Head of CISO, International, Zscaler
|
14:45 - 15:20 |
►Education Seminar Session 3 Delegates will be able to choose from the following education seminars:
|
15:20 - 15:40 |
Networking Break |
15:40 - 16:00 |
► What to really focus on for resilience Eric Stenberg, Information Security Manager, Swedbank What to really focus on for resilience:
|
16:00 - 16:30 |
► Panel Discussion: The business of being a CISO Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:25 - 16:30 |
Chairs Close |
Education seminars
How to design for any behaviour in security
Maxime Cartier, Head of Human Risk, Hoxhunt
Are there any risky behaviours you wish people in your organization would just stop doing? Or secure actions you hope they would take more often? Cybersecurity risk largely stems from people and their actions, with the human element accounting for around 80% of breaches. Therefore, the best way to reduce risk is to change behaviours.
What attendees will learn:
- A new model to design for any behaviour (model referenced by 1,000+ academic publications)
- How to apply the model to cybersecurity, with walkthrough of real-life examples such as reporting security incidents or using approved cloud platforms
- Effective strategies for implementing learned skills into tackling human risk in your organisation, summarised in a physical handout given to participants.
The Importance of Zero Trust in Kubernetes Environment
Jonas Forsberg, Solution Architect, SUSE
Beyond CVE Scanning: Unveiling the crucial role of runtime security in Kubernetes Clusters
What attendees will learn:
- Today's challenges with container security
- What to consider with CVE scanning
- Why runtime security is important
- What to consider with runtime security
Putting cyber resilience into action
Jorge Montiel, Head of Pre-Sales, EMEA, Red Sift
Cybersecurity is no longer just a concern for large corporations or government agencies; it's a fundamental aspect of doing business for organizations of all sizes. With the increasing frequency and sophistication of cyber threats, every organization must prioritize cybersecurity to protect its assets, data, and reputation. Failure to invest in cybersecurity measures can have severe consequences, including financial losses, damage to brand reputation, and legal liabilities.
What attendees will learn:
- Automate threat detection, streamline incident response, and enhance overall cyber resilience.
- Protect against phishing and BEC attacks.
- Integrate AI-driven tools for real-time monitoring and analysis to proactively identify and address potential security vulnerabilities.
- Transition from project-based approaches to continuous processes to combat evolving threats.
What can we learn from 1,000,000 applications
John Smith, CTO EMEA, Veracode
Generative AI is already having a big impact on the way that software is being developed. AI assistance is allowing code to be produced faster and in greater volume than ever but it is not delivering more secure code. Generative AI models have been trained using existing code with all of the same flaws and weaknesses that plague software. Meanwhile organisations are already drowning in security debt, so the influx of new vulnerable code could be the straw that breaks the camel’s back.
What attendees will learn:
- Review recent research into AI Code Generation and Software Security.
- Gain insight into where we are today and how we can plot a course to more secure software portfolios.
More Attacks, More Problems: 7 Key Elements of Effective Email Security
Steve Wills, Senior Sales Engineer, Abnormal Security
As long as companies use email, cybercriminals will launch email attacks. And because advanced threats exploit trusted accounts and relationships, organizations need email security that can detect even small shifts in activity and content.
What attendees will learn:
- Why modern and sophisticated attacks evade traditional solutions
- Real-world examples of inbound email attacks and email platform attacks
- The key essentials for effective cloud email security
- And how to protect your organization from the threats of today—and the future
Continuous Threat Exposure Management - Measure and mitigate risk in a dynamic threat landscape
Christopher Schrauf, SIEM & Cyber Security Architect, CyberProof
Cyber Leaders are always measured against risks they are able to mitigate in the environment. Gathering and articulating these metrics to the management board puts them under constant pressure to do more with less. How can you gather metrics that enable them, create business cases and to get new budgets to do more ?
A rapidly changing threat landscape makes time a high-value commodity. The only way security practitioners can effectively handle the dynamic relationship between the threat landscape and defensive strategies is through the smart use of automation and orchestration with unbiased, evidence-based and continuous validation of the multiple tools and technologies deployed in an enterprise environment.
What attendees will learn:
- What are the factors to generate an organisation threat profile
- How to compare your defensive capabilities against the adversarial TTPs that are most likely to affect your organisation
- How to prioritise and optimise your defences and reduce threat exposure in a manner that is both efficient and effective