About the conference

7A Posthuset, Stockholm

2 December 2025

The theme of this year

UNITING INNOVATION AND RESILIENCE IN CYBER DEFENSE

As Sweden faces more cyberattacks than ever, we are ramping efforts to secure our digital landscape. With rising global tensions and cyberattacks becoming a tool of geopolitical conflict, Sweden is under increasing threat. However, these challenges present opportunities to strengthen its cybersecurity defenses.

Sweden is investing heavily in cybersecurity technologies (AI & 6G), workforce development, and innovation. By fostering a culture of continuous innovation and training the next generation of cybersecurity professionals, Sweden is not only mitigating risks but also positioning itself as a global leader in secure digital transformation.

During State of Cybersecurity Sweden, the latest innovations and risks will be discussed, focusing on how we can secure and emphasize the importance of collaboration across industries. By working together, Sweden can build a resilient cybersecurity framework to tackle emerging threats and ensure national security.

Topics that will be covered:

This remains a critical concern. Recent reports highlight the evolving nature of cyber threats, with state actors increasingly targeting critical infrastructure and digital services to disrupt societal functions and economic stability. ​

These threats continue to be prevalent. Ransomware attacks have become more sophisticated, often involving advanced persistent threats (APTs), while phishing campaigns are increasingly leveraging AI to craft convincing messages.

Sweden is in the process of transposing the NIS2 Directive into national law through the proposed Cybersecurity Act. This legislation aims to enhance cybersecurity across 18 critical sectors, including energy, transport, and healthcare. It introduces stricter requirements for incident reporting, risk management, and supply chain security. ​

AI is increasingly being integrated into cybersecurity strategies for threat detection, incident response, and predictive analytics. The European Commission has announced significant investments in AI and cybersecurity to bolster digital resilience.

With the rise of cloud services, securing cloud infrastructures has become paramount. The EU is working on a cybersecurity certification scheme for cloud services to ensure compliance with stringent privacy and data sovereignty requirements. ​

As organizations increasingly adopt technologies like IoT, 5G, AI, and quantum computing, the threat landscape evolves. These innovations bring new vulnerabilities that require tailored security approaches. EU policy and Swedish digital strategies are prioritizing resilience for these emerging technologies, with growing investment and regulation in place.

Sweden’s strategic position in Europe, with key roles in the EU and NATO, makes it a prime target for state-sponsored cyber espionage. Hackers may aim to steal intelligence on Swedish policies, military capabilities, or economic strategies. Sweden’s prominence in tech and defense further increases its vulnerability to sophisticated cyberattacks. The current global geopolitical uncertainty—marked by shifting alliances and rising tensions—intensifies the risk, making Sweden’s cybersecurity more critical than ever.

Collaboration between public authorities and private entities is essential for effective cybersecurity. Initiatives like information sharing, joint exercises, and coordinated response plans are being emphasized to enhance collective resilience.​

Human error remains a significant vulnerability. Training programs focusing on cybersecurity awareness, phishing simulations, and promoting a culture of security are crucial in reducing risks associated with the human factor.

IAM isn’t just a technical control — it’s a strategic pillar.  IAM’s role in enabling secure digital transformation, meeting regulatory demands like NIS2, and empowering business units through decentralized, governed access.

Who is this conference for?

The conference intended target group consists of participants in the following positions:

  • (Chief) Information Security Officers
  • Business Information Security Officers
  • Technical Information Security Officers
  • (Chief) Risk Officers
  • Information Managers
  • Security Officers / Managers
  • IT Managers
  • Security Architects

WHEN CAN YOU PARTICIPATE FREE OF CHARGE?

  • You are part of the target group as described above
  • You work at and organisaton with at least 20 FTE
  • You plan three one-to-one meetings
  • You agree to the terms and conditions

Participate as partner of the conference

If you would like more information about the partner packages and/or advice about participating as a partner in the conference, you can contact Aimane El Massnaoui, Sales Executive: +31 76 548 40 27.