{"id":5919,"date":"2025-02-13T16:07:13","date_gmt":"2025-02-13T16:07:13","guid":{"rendered":"https:\/\/heliview.com\/kmo-efacturatiecongres-belgie\/?page_id=5919"},"modified":"2026-03-03T08:59:51","modified_gmt":"2026-03-03T08:59:51","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1759939248220{background-color: #FFFFFF !important;}&#8221;][vc_column css=&#8221;.vc_custom_1759939264540{background-color: #FFFFFF !important;}&#8221;][vc_empty_space]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">the programme<\/h2>\r\n                    <h3 class=\"subheading\">Keep up with all the updates!<\/h3>              \r\n              <\/div>[vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; el_class=&#8221;custom-programma&#8221; css=&#8221;.vc_custom_1759939334413{background-color: #FFFFFF !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Sessions &amp; keynotes&#8221; tab_id=&#8221;1764318985850-a8caca4d-cc2e&#8221;][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;philips&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;6466&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Reception and registration<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">We warmly welcome you to 3Arena, Stockholm.<\/p>\n<p data-start=\"77\" data-end=\"114\" data-is-last-node=\"\" data-is-only-node=\"\">Coffee and tea will be ready for you!<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;09:00 &#8211; 09:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/asa-lindell\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/11\/Asa-Lindell.png\" alt=\"\u00c5sa Lindell\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/%c3%a5sa-lindell-7b972011\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/asa-lindell\/\">\u00c5sa Lindell<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chairperson of the conference<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Opening<\/h2>\r\n                    <h3 class=\"subheading\">\u00c5sa Lindell<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Chair of the Conference \u00c5sa Lindell\u00a0warmly welcomes you to the plenary hall during Identity&amp;Access Management Sweden 2026\u00a0and will walk you through today\u2019s agenda.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;09:30 &#8211; 09:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794144589{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;ikea&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/michiel-stoop\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/11\/Michiel-Stoop.jpg.png\" alt=\"Michiel Stoop\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/macstoop\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/michiel-stoop\/\">Michiel Stoop<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Director Identity & Access Management - Philips<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">IAM in Practice at Philips<\/h2>\r\n                    <h3 class=\"subheading\">Michiel Stoop - Director Identity &amp; Access Management - Philips<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"95\" data-end=\"460\">In this session, we will explore the critical intersection of Artificial Intelligence (AI) and impact on cybersecurity. You\u2019ll gain insights into what AI Security entails, the Security AI Framework, and the various AI Security models\u00a0shaping today\u2019s landscape. We will examine the key threats and risks associated with AI, and discuss practical strategies to mitigate these challenges through robust security capabilities. We\u2019ll also examine how AI Security reshapes Identity and Access Management (IAM), and what steps organizations can take to stay resilient in this rapidly changing security landscape.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Understand the fundamentals of AI Security\u00a0and why it matters.<\/li>\n<li>Learn about the Security AI Framework\u00a0and AI Security models.<\/li>\n<li>Identify common threats and risks\u00a0in AI systems.<\/li>\n<li>Discover mitigation strategies and security capabilities\u00a0to safeguard AI.<\/li>\n<li>Explore the impact of AI Security on IAM\u00a0and how to adapt your identity strategy.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7068&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;09:40 &#8211; 10:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1764596664982{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/johan-finndahl\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/11\/Johan-Finndahl.jpg\" alt=\"Johan Finndahl\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/johanfinndahl\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/johan-finndahl\/\">Johan Finndahl<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Engineering Manager& Access Governance - IKEA Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Assembling Access: Custom Authorizations Meets Open Policy Agent at IKEA<\/h2>\r\n                    <h3 class=\"subheading\">Johan Finndahl - Engineering Manager &amp; Access Governance - Ikea<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]At IKEA, we\u2019ve built a custom authorization service designed to meet the complex and evolving access control needs of a global organization. Now, we\u2019re taking the next step by augmenting this foundation with Open Policy Agent (OPA) to unlock the full potential of policy-based access control and fine-grained authorization.<\/p>\n<p>The\u00a0session shares how IKEA is evolving its approach to authorization, moving from traditional role-based models toward policies. We\u2019ll explore the motivations behind adopting OPA, the integration journey so far, and how this shift is helping us improve scalability, flexibility, and developer experience.<\/p>\n<p>Attendees will gain insights into the architectural principles guiding our transition, the challenges we\u2019re tackling, and the vision where the right people have the right access at the right time for the right reasons. Whether you&#8217;re exploring\u00a0authorisation services\u00a0or looking to modernize your access control strategy, this session offers practical perspectives from IKEA\u2019s journey.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7016&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;10:05 &#8211; 10:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Morning Break at The Network Square With 1-to-1 Meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Enjoy fresh coffee, tea and snacks on the network square. And the first 1-to-1 meetings take place. Check your EventManager for your personal programme.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;10:30 &#8211; 11:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1764596675152{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;vattenfal&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sadrick-widmann\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/Sadrick-Widmann-1.jpg\" alt=\"Sadrick Widmann\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/sadrickwidmann\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sadrick-widmann\/\">Sadrick Widmann<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">CEO of \u0441idaas by Widas ID<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Identity Management: The European Love Story You Didn\u2019t Know You Needed<\/h2>\r\n                    <h3 class=\"subheading\">Sadrick Widmann - CEO of Cidaas<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Every great love story has a twist \u2014 and in Europe\u2019s pursuit of digital sovereignty, the unexpected hero is Identity &amp; Access Management (IAM). Sovereignty isn\u2019t just about data location or control; it\u2019s about who defines trust in your digital ecosystem. While companies focus on features, scalability, and UX, they often overlook the heart of it all: identity.<\/p>\n<p>This session explores why IAM is not just a tool but the foundation of security, trust, and resilience. In the era of digital sovereignty, IAM becomes the beating heart of innovation \u2014 and the start of a true digital love story.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6755&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:15 &#8211; 11:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1764596675152{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/7307\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Niels-Fenger.jpg\" alt=\"Niels Fenger\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/niels-j%C3%B8rgen-fenger-10501a7\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/7307\/\">Niels Fenger<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Director IGA Advisory - Omada<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">IGA + AI: The Pragmatic Playbook<\/h2>\r\n                    <h3 class=\"subheading\">Niels Fenger - Director IGA Advisory - Omada<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]A modern, risk based, classification driven IGA approach is essential for compliance, security, and operational efficiency. This session shows how AI accelerates insight and governance without replacing it- and why clear ownership, smart controls, and structured classification matter more than ever.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7078&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:15 &#8211; 11:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794158418{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;swedbank&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jochen-raymaekers\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/12\/Foto-Jochen-Raymaekers-1.jpg\" alt=\"Jochen Raymaekers\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/jochenraymaekers\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jochen-raymaekers\/\">Jochen Raymaekers<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Sr. Principal Solution Architect of Ping Identity<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Delegated, Dynamic, Scalable: What modern B2B IAM should Look Like<\/h2>\r\n                    <h3 class=\"subheading\">Jochen Raymaekers - Sr. Principal Solution Architect - Ping Identity<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Third party access is no longer a side concern. It is a core enabler of enterprise growth. Yet most organizations still rely on siloed tools and manual processes that introduce risk, slow onboarding, and frustrate partners.<\/p>\n<p data-start=\"0\" data-end=\"75\">This session explores how modern B2B identity strategies such as delegated administration, dynamic orchestration, and hierarchical organization modeling are helping enterprises reduce risk, improve compliance, and accelerate partner-driven revenue. Learn how to shift third party access from a liability to a competitive advantage.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7061&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:45 &#8211; 12:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/bart-bruijnesteijn\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Bart-Bruijnesteijn.jpg\" alt=\"Bart Bruijnesteijn\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/bbruijnesteijn\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/bart-bruijnesteijn\/\">Bart Bruijnesteijn<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Director Solutions Engineering of CyberArk<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises<\/h2>\r\n                    <h3 class=\"subheading\">Bart Bruijnesteijn - Senior Director Solutions Engineering of CyberArk<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.<br \/>\nFragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.<\/p>\n<p>This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.<\/p>\n<p><strong>Key learnings:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Why privilege controls for all identities (human, machine and AI) will give you the upper hand<\/li>\n<li>How proactive threat detection with the use of AI helps you stay ahead of the threat<\/li>\n<li>How to gain complete visibility across environments<\/li>\n<li>How to achieve faster mitigation of security breaches through shared data and insights<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7251&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:45 &#8211; 12:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/matt-sturman\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Matt-Sturman.jpg\" alt=\"Matt Sturman\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/matthewsturman\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/matt-sturman\/\">Matt Sturman<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Director Solutions Engingeering<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Beyond Privilege: Modern PAM for a Dynamic, Hybrid World<\/h2>\r\n                    <h3 class=\"subheading\">Matt Sturman - Director Solutions Engineering of BeyondTrust<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Despite growing budgets and tighter compliance mandates, cyber risk continues to rise. Identities remain a prime target, with attackers exploiting hidden Paths to Privilege\u2122 to gain access. Managing elevated permissions across hybrid environments is complex, and traditional Privileged Access Management (PAM) tools \u2013 focused solely on privileged accounts \u2013 leave dangerous gaps.<\/p>\n<p>This session explores how modern, identity\u2011centric PAM secures all users, reduces risk, and streamlines access. We\u2019ll also touch on how emerging Agentic AI capabilities can enhance proactive defense and adaptive control \u2013 augmenting how you discover, govern, and respond \u2013 so your organization stays both protected and productive in an ever\u2011changing threat landscape.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7064&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:15 &#8211; 12:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jas-sagoo\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Jas-Sagoo.jpg\" alt=\"Jas Sagoo\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/jas-sagoo\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jas-sagoo\/\">Jas Sagoo<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Head of International Auth0 Sales & Strategy of Okta<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Trust at Machine Speed: Identity as the Control Plane for AI Agents<\/h2>\r\n                    <h3 class=\"subheading\">Jas Sagoo - Head of International Auth0 Sales &amp; Strategy of Okta<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]AI Agents are rapidly evolving from simple automation tools into a new digital workforce. Acting, deciding, and interacting on behalf of customers and enterprises. But as these autonomous systems scale, they introduce a critical challenge: how do we maintain trust when interactions happen faster than human oversight allows?<\/p>\n<p>In this session, we will explore how AI Agents are fundamentally reshaping customer and employee experiences and why identity must become the new control plane for agentic systems. We will move beyond the hype to discuss the architectural reality of securing non-human identities, ensuring you can authenticate, authorise, and govern AI Agents without compromising user experience, privacy, or compliance.<\/p>\n<p><strong>Key Take Aways from this session:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Mastering the shift from Automation to Agentic AI and the new Security Paradigm it demands.<\/li>\n<li>Discovering how Identity serves as the Trust Anchor connecting humans, agents, and systems.<\/li>\n<li>Mitigating\u00a0risks of Unmanaged Agents with Agentic Security to prevent silent failure and abuse.<\/li>\n<li>Actionable strategies to govern Scalable AI Agents and lead an Agent-Driven Future.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7063&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:15 &#8211; 12:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Lunch Break at the Network Square with 1-to-1 Meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Enjoy your lunch at the networking square.\u00a0During lunch there is enough time for 1-on-1 meetings and networking with colleagues, solution providers, peers and speakers.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;12:45 &#8211; 13:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jaens-stafren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/01\/Foto-Jaens-Stafren.jpg\" alt=\"Jaens Stafren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/jaensstafren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/jaens-stafren\/\">Jaens Stafren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Sales EMEA of Keeper Security Emea Ltd<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/7289\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Joao-Lima.jpg\" alt=\"Joao Lima\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/7289\/\">Joao Lima<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Solutions Engineer<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Securing Your Network with Zero-Trust<\/h2>\r\n                    <h3 class=\"subheading\">Jaens Stafren - Sales EMEA of Keeper Security Emea Ltd &amp; Joao Lima - Solutions Engineer of Keeper Security Emea Ltd<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"103\" data-end=\"416\">This presentation examines why the traditional layered defense model is no longer sufficient in today&#8217;s threat landscape. With attackers increasingly targeting privileged credentials and exploiting gaps created by fragmented tools, organisations must shift to a security framework built on zero-trust and zero knowledge.<\/p>\n<p>This session explains how continuous authentication, least-privilege access, and device-level encryption prevent unauthorized movement across networks, and why zero-trust is critical for protecting sensitive data.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7283&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:50 &#8211; 14:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/mikael-wikstrom\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2026\/02\/Foto-Mikael-Wikstrom.jpg\" alt=\"Mikael Wikstr\u00f6m\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/wicke\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/mikael-wikstrom\/\">Mikael Wikstr\u00f6m<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Identity Advisor of SailPoint<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Identity Security in the age of autonomous AI<\/h2>\r\n                    <h3 class=\"subheading\">Mikael Wikstr\u00f6m - Identity Advisor of SailPoint<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Autonomous AI is reshaping the digital landscape, but how do you ensure it operates responsibly? Learn how Identity Security serves as the control plane for managing AI agents, providing the visibility and governance needed to align AI with your business objectives.<\/p>\n<p><strong>Key Take Aways from this session:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Why privilege controls for all identities (human, machine and AI) will give you the upper hand<\/li>\n<li>Understanding the role of Identity Security in AI governance<\/li>\n<li>Achieving visibility and control over AI agents<\/li>\n<li>Aligning autonomous AI with business goals<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6731&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:50 &#8211; 14:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794158418{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/raju-bhandkoli\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/12\/Raju-Bhandkoli.png\" alt=\"Raju Bhandkoli\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/bhandkoliraju\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/raju-bhandkoli\/\">Raju Bhandkoli<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Cybersecurity IAM Architect<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Governance at Scale: Driving Digital Transformation Through Identity<\/h2>\r\n                    <h3 class=\"subheading\">Raju Bhandkoli - Cybersecurity IAM Architect - Electrolux Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Successful IGA transformation isn\u2019t about enforcing requirements\u2014it\u2019s about enabling a new way of working. Governance at scale means embedding identity into the fabric of digital transformation, ensuring agility and resilience. This session explores how shifting from legacy thinking to modern, cloud-first governance unlocks innovation and trust.<\/p>\n<p data-start=\"0\" data-end=\"75\"><strong>Mindset Shift Talking Points:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Why governance must evolve from \u201ccontrol\u201d to \u201cenablement\u201d.<\/li>\n<li>Breaking silos: Identity as a shared business responsibility.<\/li>\n<li>Building executive buy-in through measurable business outcomes.<\/li>\n<li>Cultural change: moving from \u201cIT-driven\u201d to \u201cbusiness-led\u201d transformation.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;14:20 &#8211; 14:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794158418{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sourabh-jaiswal\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/Sourabh-Jaiswal-1.jpg\" alt=\"Sourabh Jaiswal\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/luvsourabh\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sourabh-jaiswal\/\">Sourabh Jaiswal<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Sandvik<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Mastering PAM: Overcoming Challenges and Unlocking Value<\/h2>\r\n                    <h3 class=\"subheading\">Sourabh Jaiswal - Solutions Architect IAM - Sandvik AB<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Sourabh Jaiswal, Solution Architect at Sandvik, shares his hands-on experiences implementing Privileged Access Management (PAM) across multiple industries, including banking, telecom, construction, and mining. He dives into the real-world difficulties and challenges encountered during PAM implementations, the support needed to succeed, and why some organizations reduce PAM to a simple compliance checkbox, turning it into a glorified password manager.<\/p>\n<p>Drawing on advanced PAM features such as password rotation, Zero Standing Privileges, Just\u2011in-Time access, and scripting, Sourabh demonstrates how PAM can move beyond basic deployment to become a strategic tool for security, compliance, and operational efficiency. Participants will gain practical insights and actionable guidance to ensure their PAM implementations deliver real business and security value.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7301&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:20 &#8211; 14:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Afternoon break at the networking square with 1-to-1 meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Enjoy fresh coffee, tea and snacks on the network square. The last 1-to-1 meetings will take place. After this you get to enjoy the closing break-out sessions and key-note\u00a0and networking drinks.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;14:50 &#8211; 15:25&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1764596710928{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;swedbank&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/martin-sandren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/Martin-Sandren-1.jpg\" alt=\"Martin Sandren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/martinsandren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/martin-sandren\/\">Martin Sandren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">IAM Product Lead - IKEA<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">AI agents<\/h2>\r\n                    <h3 class=\"subheading\">Martin Sandren IAM Product Lead - IKEA<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Martin Sandren, IAM\u00a0 Product Lead at Inter IKEA\u00a0and security architect with over twenty years of international experience in digital identity and security architecture, explores how AI agents are rapidly becoming part of the enterprise identity landscape. As organizations adopt AI-driven automation, IAM teams face new challenges in governance, risk management, and access control.<\/p>\n<p>In this session, Martin examines the different types of AI agents and how to secure them without slowing down innovation. Drawing on real-world IAM leadership experience at global scale (450,000+ users), he demonstrates how concepts such as Zero Standing Privileges and ephemeral access can protect both the agents and the enterprise.<\/p>\n<p>Participants will gain practical insights into how AI agents fit into their identity fabric, which controls are essential to manage emerging risks, and how AI security is likely to evolve in the coming years.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7016&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:30 &#8211; 15:55&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1764596710928{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sebastin-stauber\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/Sebastian-Stauber.jpeg\" alt=\"Sebastian Stauber\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/sebastian-stauber\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/sebastin-stauber\/\">Sebastian Stauber<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Security Architect - Assemblin Caverion Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Privileged Access, Smarter Choices: Driving Security and Cost-Effectiveness<\/h2>\r\n                    <h3 class=\"subheading\">Sebastian Stauber - Group Security Architect - Assemblin Caverion Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"0\" data-end=\"75\">Privileged Access Management (PAM) is a cornerstone of modern enterprise security, but successful implementation requires more than deploying a tool.<\/p>\n<p data-start=\"0\" data-end=\"75\">This session explores how to communicate PAM\u2019s business value to leadership, its critical role in a zero-trust strategy, and practical approaches to requirements engineering. Attendees will also gain insights into selecting the most cost-effective PAM solution for their organization\u2019s use cases, while avoiding common pitfalls in adoption and integration.<\/p>\n<p data-start=\"0\" data-end=\"75\">The talk will further highlight how combining PAM with Identity Governance and Administration (IGA) enhances privileged access governance, ensuring stronger oversight and compliance.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6832&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:30 &#8211; 15:55&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/par-kidman\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/11\/Par-Kidman.jpg\" alt=\"P\u00e4r Kidman\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/p%c3%a4r-kidman-a9b8901%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management-sweden\/speaker\/par-kidman\/\">P\u00e4r Kidman<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Head of Identity & Access Management - Swedbank AB<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Transforming IAM to Deliver Business Value<\/h2>\r\n                    <h3 class=\"subheading\">P\u00e4r Kidman - Head of Identity &amp; Access Management - Swedbank AB<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Swedbank\u2019s Head of Identity &amp; Access Management, P\u00e4r Kidman, shares how the bank reframed IAM as a strategic enabler. By focusing on governance, stakeholder collaboration, and aligning identity security with business priorities, Swedbank reduced risk, strengthened compliance, and improved the overall business experience.<\/p>\n<p>Anchored in regulatory requirements, threat mitigation, and multi\u2011cloud adoption, this identity\u2011centric approach demonstrated clear business value and secured organizational buy\u2011in. Participants will gain practical insights into how IAM can mature into a transparent, scalable model directly linked to organizational goals.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7017&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;16:00 &#8211; 16:25&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1759938873533{background-color: #FFFFFF !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7134&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Networking Reception<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p data-start=\"103\" data-end=\"416\">The day will conclude with an extended networking reception, including an open bar. This provides an opportunity to connect with fellow professionals, exchange insights, and continue conversations with speakers in an informal setting. A valuable moment to strengthen professional relationships and reflect on key takeaways from the day.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;16:30 &#8211; 17:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1759938713019{padding-bottom: 30px !important;background-color: #F2F2F2 !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Who's speaking?<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Curious to know who will take the stage at<strong> Identity &amp; Access Management Sweden?<\/strong> Meet the speakers![\/vc_column_text]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"\/identity-access-management-sweden\/speakers\" target=\"_self\"><span>Experts<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1759939248220{background-color: #FFFFFF !important;}&#8221;][vc_column css=&#8221;.vc_custom_1759939264540{background-color: #FFFFFF !important;}&#8221;][vc_empty_space][vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; el_class=&#8221;custom-programma&#8221; css=&#8221;.vc_custom_1759939334413{background-color: #FFFFFF !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Sessions &amp; keynotes&#8221; tab_id=&#8221;1764318985850-a8caca4d-cc2e&#8221;][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF !important;}&#8221; el_id=&#8221;philips&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;6466&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;] We warmly welcome you to 3Arena, Stockholm. Coffee and tea will be ready for you! [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;09:00 &#8211; 09:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1765794193213{background-color: #FFFFFF [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5919","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Programme | Identity &amp; Access Management Sweden<\/title>\r\n<meta name=\"description\" content=\"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Programme | Identity &amp; Access Management Sweden\" \/>\r\n<meta property=\"og:description\" content=\"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Identity &amp; Access Management Sweden\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-03-03T08:59:51+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/congres-foto.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"567\" \/>\r\n\t<meta property=\"og:image:height\" content=\"567\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/\",\"url\":\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/\",\"name\":\"Programme | Identity & Access Management Sweden\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management-sweden\/#website\"},\"datePublished\":\"2025-02-13T16:07:13+00:00\",\"dateModified\":\"2026-03-03T08:59:51+00:00\",\"description\":\"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/identity-access-management-sweden\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/identity-access-management-sweden\/#website\",\"url\":\"https:\/\/heliview.com\/identity-access-management-sweden\/\",\"name\":\"Identity &amp; Access Management Sweden\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/identity-access-management-sweden\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programme | Identity & Access Management Sweden","description":"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/","og_locale":"en_US","og_type":"article","og_title":"Programme | Identity & Access Management Sweden","og_description":"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more","og_url":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/","og_site_name":"Identity &amp; Access Management Sweden","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-03-03T08:59:51+00:00","og_image":[{"width":567,"height":567,"url":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-content\/uploads\/sites\/55\/2025\/10\/congres-foto.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@HeliviewConf","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/","url":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/","name":"Programme | Identity & Access Management Sweden","isPartOf":{"@id":"https:\/\/heliview.com\/identity-access-management-sweden\/#website"},"datePublished":"2025-02-13T16:07:13+00:00","dateModified":"2026-03-03T08:59:51+00:00","description":"Discover the latest trends and developments such as PAM, Zero Trust, IGA and more","breadcrumb":{"@id":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/identity-access-management-sweden\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/identity-access-management-sweden\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/identity-access-management-sweden\/"},{"@type":"ListItem","position":2,"name":"Programme"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/identity-access-management-sweden\/#website","url":"https:\/\/heliview.com\/identity-access-management-sweden\/","name":"Identity &amp; Access Management Sweden","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/identity-access-management-sweden\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/pages\/5919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/comments?post=5919"}],"version-history":[{"count":10,"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/pages\/5919\/revisions"}],"predecessor-version":[{"id":7319,"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/pages\/5919\/revisions\/7319"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/identity-access-management-sweden\/wp-json\/wp\/v2\/media?parent=5919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}