About State of Cyber Security Sweden

Bygget Fest & Konferens, Stockholm

2 December 2025

The theme of last year

Securing Sweden: Uniting Innovation and Resilience in Cyber Defense

In an era where cyber threats are becoming increasingly sophisticated and frequent due to ongoing global conflicts, Sweden stands at a pivotal point in strengthening its cybersecurity posture. This theme is crucial as it underscores the need for a synergistic approach, combining the strengths of both public and private sectors to fortify defenses against cyber adversaries. By fostering innovation through cutting-edge technologies like AI and implementing stringent regulatory measures such as the NIS2 Directive and the EU Cybersecurity Act, Sweden can lead in proactive threat mitigation.

This conference highlights the comprehensive and collaborative efforts needed to protect Sweden’s digital future. It reflects a commitment to fostering a resilient cybersecurity ecosystem that can withstand and quickly recover from emerging threats, ensuring the safety and integrity of Sweden’s digital infrastructure. Furthermore, the importance of business continuity management cannot be overstated, as it ensures that critical operations remain functional in the face of cyber disruptions.

Topics that will be covered:

  • Destabilizing societies or reducing competitiveness through cyber-attacks
  • Current cyber attacks: ransomware, phishing, DDoS
  • NIS2 Directive and Regulatory Compliance
  • Artificial Intelligence in Cybersecurity
  • Security Architecture and Cloud Security
  • Potential attackers and their objectives
  • Attackers using operational technology to achieve goals
  • Public- Private Synergy
  • Increasing resistance in critical societal organisations
  • The Human Factor

Description of the topics:

Destabilizing societies or reducing competitiveness through cyber attacks
Cyberattacks can disrupt a country’s infrastructure and undermine its economic competitiveness and societal stability. Examples include attacks on critical infrastructure, which can compromise essential services such as energy supply and communication.

Current cyber-attacks: ransomware, phishing, DDoS
Focuses on the most common forms of cyberattacks, including ransomware, phishing, and Distributed Denial of Service (DDoS). Discusses their methods, consequences, and strategies for prevention and mitigation.

NIS2 Directive and Regulatory Compliance
Covers the NIS2 Directive and other regulations aimed at strengthening cybersecurity within the EU. Addresses compliance requirements and their impact on organizations in Sweden.

Artificial Intelligence in Cybersecurity
Explores the role of artificial intelligence in detecting, analyzing, and responding to cyber threats. Highlights how AI can contribute to proactive security strategies and strengthen cyber defenses.

Security Architecture and Cloud Security
Focuses on designing secure IT architectures and addressing specific challenges and solutions related to cloud security. Covers best practices for securing cloud environments and protecting data from breaches.

Potential attackers and their objectives
Investigates the different types of attackers, such as state actors, cybercriminals, and hacktivists, and their motives. Provides insight into why and how these attackers operate and what their ultimate goals are.

Attackers using operational technology to achieve goals
Examines attacks targeting operational technology (OT), such as industrial control systems. Discusses how attackers exploit OT to cause physical damage or disrupt business processes.

Public-Private Synergy
Emphasizes the importance of collaboration between the public and private sectors for an effective cybersecurity strategy. Covers initiatives and best practices for sharing information and resources.

Increasing resistance in critical societal organisations
Discusses how crucial societal organizations, such as healthcare, energy, and transportation, can increase their resilience against cyber threats. Addresses strategies for risk management and crisis response.

The Human Factor
Investigates the role of humans in cybersecurity, including awareness, training, and behavior change. Emphasizes how human errors and insider threats can be minimized by fostering a culture of security.

Who is this conference for?

The conference intended target group consists of participants in the following positions:

  • (Chief) Information Security Officers
  • Business Information Security Officers
  • Technical Information Security Officers
  • (Chief) Risk Officers
  • Information Managers
  • Security Officers / Managers
  • IT Managers
  • Security Architects

WHEN CAN YOU PARTICIPATE FREE OF CHARGE?

  • You are part of the target group as described above
  • You work at and organisaton with at least 20 FTE
  • You plan three one-to-one meetings
  • You agree to the terms and conditions

Participate as partner of the conference

If you would like more information about the partner packages and/or advice about participating as a partner in the conference, you can contact Aimane El Massnaoui, Sales Executive: +31 76 548 40 27.