Programme

17 March 2026

3 Arena - Stockholm

9.30 - 16.30

the programme

Keep up with all the updates!

Reception and registration

We warmly welcome you to 3Arena, Stockholm.

Coffee and tea will be ready for you!

Åsa Lindell

Åsa Lindell

Chairperson of the conference

Opening by Chair of the Conference

Åsa Lindell

Chair of the Conference Åsa Lindell warmly welcomes you to the plenary hall during Identity&Access Management Sweden 2026 and will walk you through today’s agenda.

Michiel Stoop

Michiel Stoop

Director Identity & Access Management - Philips

IAM in Practice at Philips

Michiel Stoop - Director Identity & Access Management - Philips

In this session, we will explore the critical intersection of Artificial Intelligence (AI) and impact on cybersecurity. You’ll gain insights into what AI Security entails, the Security AI Framework, and the various AI Security models shaping today’s landscape. We will examine the key threats and risks associated with AI, and discuss practical strategies to mitigate these challenges through robust security capabilities. We’ll also examine how AI Security reshapes Identity and Access Management (IAM), and what steps organizations can take to stay resilient in this rapidly changing security landscape.

Key Takeaways:

  • Understand the fundamentals of AI Security and why it matters.
  • Learn about the Security AI Framework and AI Security models.
  • Identify common threats and risks in AI systems.
  • Discover mitigation strategies and security capabilities to safeguard AI.
  • Explore the impact of AI Security on IAM and how to adapt your identity strategy.
Johan Finndahl

Johan Finndahl

Engineering Manager& Access Governance - IKEA Group

Assembling Access: Custom Authorizations Meets Open Policy Agent at IKEA

Johan Finndahl - Engineering Manager & Access Governance - Ikea

At IKEA, we’ve built a custom authorization service designed to meet the complex and evolving access control needs of a global organization. Now, we’re taking the next step by augmenting this foundation with Open Policy Agent (OPA) to unlock the full potential of policy-based access control and fine-grained authorization.

The session shares how IKEA is evolving its approach to authorization, moving from traditional role-based models toward policies. We’ll explore the motivations behind adopting OPA, the integration journey so far, and how this shift is helping us improve scalability, flexibility, and developer experience.

Attendees will gain insights into the architectural principles guiding our transition, the challenges we’re tackling, and the vision where the right people have the right access at the right time for the right reasons. Whether you’re exploring authorisation services or looking to modernize your access control strategy, this session offers practical perspectives from IKEA’s journey.

Morning Break at The Network Square With 1-to-1 Meetings

Enjoy fresh coffee, tea and snacks on the network square. And the first 1-to-1 meetings take place. Check your EventManager for your personal programme.

Sadrick Widmann

Sadrick Widmann

CEO of сidaas by Widas ID

Identity Management: The European Love Story You Didn’t Know You Needed

Sadrick Widmann - CEO of Cidaas

Every great love story has a twist — and in Europe’s pursuit of digital sovereignty, the unexpected hero is Identity & Access Management (IAM). Sovereignty isn’t just about data location or control; it’s about who defines trust in your digital ecosystem. While companies focus on features, scalability, and UX, they often overlook the heart of it all: identity.

This session explores why IAM is not just a tool but the foundation of security, trust, and resilience. In the era of digital sovereignty, IAM becomes the beating heart of innovation — and the start of a true digital love story.

Niels Fenger

Niels Fenger

Director IGA Advisory - Omada

IGA + AI: The Pragmatic Playbook

Niels Fenger - Director IGA Advisory - Omada

A modern, risk based, classification driven IGA approach is essential for compliance, security, and operational efficiency. This session shows how AI accelerates insight and governance without replacing it- and why clear ownership, smart controls, and structured classification matter more than ever.

Jochen Raymaekers

Jochen Raymaekers

Sr. Principal Solution Architect of Ping Identity

Delegated, Dynamic, Scalable: What modern B2B IAM should Look Like

Jochen Raymaekers - Sr. Principal Solution Architect - Ping Identity

Third party access is no longer a side concern. It is a core enabler of enterprise growth. Yet most organizations still rely on siloed tools and manual processes that introduce risk, slow onboarding, and frustrate partners.

This session explores how modern B2B identity strategies such as delegated administration, dynamic orchestration, and hierarchical organization modeling are helping enterprises reduce risk, improve compliance, and accelerate partner-driven revenue. Learn how to shift third party access from a liability to a competitive advantage.

Bart Bruijnesteijn

Bart Bruijnesteijn

Senior Director Solutions Engineering of CyberArk

Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises

Bart Bruijnesteijn - Senior Director Solutions Engineering of CyberArk

As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.
Fragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.

This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.

Key learnings:

  • Why privilege controls for all identities (human, machine and AI) will give you the upper hand
  • How proactive threat detection with the use of AI helps you stay ahead of the threat
  • How to gain complete visibility across environments
  • How to achieve faster mitigation of security breaches through shared data and insights
Matt Sturman

Matt Sturman

Director Solutions Engingeering

Beyond Privilege: Modern PAM for a Dynamic, Hybrid World

Matt Sturman - Director Solutions Engineering of BeyondTrust

Despite growing budgets and tighter compliance mandates, cyber risk continues to rise. Identities remain a prime target, with attackers exploiting hidden Paths to Privilege™ to gain access. Managing elevated permissions across hybrid environments is complex, and traditional Privileged Access Management (PAM) tools – focused solely on privileged accounts – leave dangerous gaps.

This session explores how modern, identity‑centric PAM secures all users, reduces risk, and streamlines access. We’ll also touch on how emerging Agentic AI capabilities can enhance proactive defense and adaptive control – augmenting how you discover, govern, and respond – so your organization stays both protected and productive in an ever‑changing threat landscape.

Jas Sagoo

Jas Sagoo

Head of International Auth0 Sales & Strategy of Okta

Trust at Machine Speed: Identity as the Control Plane for AI Agents

Jas Sagoo - Head of International Auth0 Sales & Strategy of Okta

AI Agents are rapidly evolving from simple automation tools into a new digital workforce. Acting, deciding, and interacting on behalf of customers and enterprises. But as these autonomous systems scale, they introduce a critical challenge: how do we maintain trust when interactions happen faster than human oversight allows?

In this session, we will explore how AI Agents are fundamentally reshaping customer and employee experiences and why identity must become the new control plane for agentic systems. We will move beyond the hype to discuss the architectural reality of securing non-human identities, ensuring you can authenticate, authorise, and govern AI Agents without compromising user experience, privacy, or compliance.

Key Take Aways from this session:

  • Mastering the shift from Automation to Agentic AI and the new Security Paradigm it demands.
  • Discovering how Identity serves as the Trust Anchor connecting humans, agents, and systems.
  • Mitigating risks of Unmanaged Agents with Agentic Security to prevent silent failure and abuse.
  • Actionable strategies to govern Scalable AI Agents and lead an Agent-Driven Future.

Lunch Break at the Network Square with 1-to-1 Meetings

Enjoy your lunch at the networking square. During lunch there is enough time for 1-on-1 meetings and networking with colleagues, solution providers, peers and speakers.

Jaens Stafren

Jaens Stafren

Sales EMEA of Keeper Security Emea Ltd

Joao Lima

Joao Lima

Solutions Engineer

Securing Your Network with Zero-Trust

Jaens Stafren - Sales EMEA of Keeper Security Emea Ltd & Joao Lima - Solutions Engineer of Keeper Security Emea Ltd

This presentation examines why the traditional layered defense model is no longer sufficient in today’s threat landscape. With attackers increasingly targeting privileged credentials and exploiting gaps created by fragmented tools, organisations must shift to a security framework built on zero-trust and zero knowledge.

This session explains how continuous authentication, least-privilege access, and device-level encryption prevent unauthorized movement across networks, and why zero-trust is critical for protecting sensitive data.

Mikael Wikström

Mikael Wikström

Identity Advisor of SailPoint

Identity Security in the age of autonomous AI

Mikael Wikström - Identity Advisor of SailPoint

Autonomous AI is reshaping the digital landscape, but how do you ensure it operates responsibly? Learn how Identity Security serves as the control plane for managing AI agents, providing the visibility and governance needed to align AI with your business objectives.

Key Take Aways from this session:

  • Why privilege controls for all identities (human, machine and AI) will give you the upper hand
  • Understanding the role of Identity Security in AI governance
  • Achieving visibility and control over AI agents
  • Aligning autonomous AI with business goals
Raju Bhandkoli

Raju Bhandkoli

Cybersecurity IAM Architect

Governance at Scale: Driving Digital Transformation Through Identity

Raju Bhandkoli - Cybersecurity IAM Architect - Electrolux Group

Successful IGA transformation isn’t about enforcing requirements—it’s about enabling a new way of working. Governance at scale means embedding identity into the fabric of digital transformation, ensuring agility and resilience. This session explores how shifting from legacy thinking to modern, cloud-first governance unlocks innovation and trust.

Mindset Shift Talking Points:

  • Why governance must evolve from “control” to “enablement”.
  • Breaking silos: Identity as a shared business responsibility.
  • Building executive buy-in through measurable business outcomes.
  • Cultural change: moving from “IT-driven” to “business-led” transformation.

Mastering PAM: Overcoming Challenges and Unlocking Value

Sourabh Jaiswal - Solutions Architect IAM - Sandvik AB

Sourabh Jaiswal, Solution Architect at Sandvik, shares his hands-on experiences implementing Privileged Access Management (PAM) across multiple industries, including banking, telecom, construction, and mining. He dives into the real-world difficulties and challenges encountered during PAM implementations, the support needed to succeed, and why some organizations reduce PAM to a simple compliance checkbox, turning it into a glorified password manager.

Drawing on advanced PAM features such as password rotation, Zero Standing Privileges, Just‑in-Time access, and scripting, Sourabh demonstrates how PAM can move beyond basic deployment to become a strategic tool for security, compliance, and operational efficiency. Participants will gain practical insights and actionable guidance to ensure their PAM implementations deliver real business and security value.

Afternoon break at the networking square with 1-to-1 meetings

Enjoy fresh coffee, tea and snacks on the network square. The last 1-to-1 meetings will take place. After this you get to enjoy the closing break-out sessions and key-note and networking drinks.

Martin Sandren

Martin Sandren

IAM Product Lead - IKEA

AI agents

Martin Sandren IAM Product Lead - IKEA

Martin Sandren, IAM  Product Lead at Inter IKEA and security architect with over twenty years of international experience in digital identity and security architecture, explores how AI agents are rapidly becoming part of the enterprise identity landscape. As organizations adopt AI-driven automation, IAM teams face new challenges in governance, risk management, and access control.

In this session, Martin examines the different types of AI agents and how to secure them without slowing down innovation. Drawing on real-world IAM leadership experience at global scale (450,000+ users), he demonstrates how concepts such as Zero Standing Privileges and ephemeral access can protect both the agents and the enterprise.

Participants will gain practical insights into how AI agents fit into their identity fabric, which controls are essential to manage emerging risks, and how AI security is likely to evolve in the coming years.

Sebastian Stauber

Sebastian Stauber

Security Architect - Assemblin Caverion Group

Privileged Access, Smarter Choices: Driving Security and Cost-Effectiveness

Sebastian Stauber - Group Security Architect - Assemblin Caverion Group

Privileged Access Management (PAM) is a cornerstone of modern enterprise security, but successful implementation requires more than deploying a tool.

This session explores how to communicate PAM’s business value to leadership, its critical role in a zero-trust strategy, and practical approaches to requirements engineering. Attendees will also gain insights into selecting the most cost-effective PAM solution for their organization’s use cases, while avoiding common pitfalls in adoption and integration.

The talk will further highlight how combining PAM with Identity Governance and Administration (IGA) enhances privileged access governance, ensuring stronger oversight and compliance.

Pär Kidman

Pär Kidman

Head of Identity & Access Management - Swedbank AB

Transforming IAM to Deliver Business Value

Pär Kidman - Head of Identity & Access Management - Swedbank AB

Swedbank’s Head of Identity & Access Management, Pär Kidman, shares how the bank reframed IAM as a strategic enabler. By focusing on governance, stakeholder collaboration, and aligning identity security with business priorities, Swedbank reduced risk, strengthened compliance, and improved the overall business experience.

Anchored in regulatory requirements, threat mitigation, and multi‑cloud adoption, this identity‑centric approach demonstrated clear business value and secured organizational buy‑in. Participants will gain practical insights into how IAM can mature into a transparent, scalable model directly linked to organizational goals.

Networking Reception

The day will conclude with an extended networking reception, including an open bar. This provides an opportunity to connect with fellow professionals, exchange insights, and continue conversations with speakers in an informal setting. A valuable moment to strengthen professional relationships and reflect on key takeaways from the day.

Who's speaking?

Curious to know who will take the stage at Identity & Access Management Sweden? Meet the speakers!