Reception and registration at Bygget Fest
Upon arrival, you will be warmly welcomed with coffee and tea, setting the tone for a comfortable and enjoyable event experience.
Bygget fest is a high-standard eventvenue located at: Norrlandsgatan 11, 111 43 Stockholm.
Located in the center of Stockholm (Östermalm), easiliy accesible by foot or public transport (T-Centralen & Östermalmstorg)
Kick-off State of Cybersecurity Sweden 2024
Teodor Axlund, Chairman of the day
In a fitting manner, event chair Teodor Axlund will kick off the second edition of the State of Cybersecurity Event. A day full of knowledge and inspiration begins!
Magical Defenses: IT Security Insights from the Dark Side of the Internet
Jesper Larsson, IT-Security Researcher, 0x4A
This presentation addresses the advanced tactics of modern attackers and practical defense strategies. We explore how attackers exploit vulnerabilities through methods like phishing and social engineering and then shift focus to effective defense mechanisms. Key topics include the importance of robust security concepts and user education to identify and counteract threats. Attendees will gain essential insights into enhancing digital security against evolving cyber threats.
Jesper Larsson, known from the TV program “Hackad,” will take you on a journey through IT Security Insights from the Dark Side of the Internet during this presentation.
Safeguarding Sweden: Navigating the Global Cyber Threat Landscape
André Catry, Senior Advisor in IT/Information Security and Cyber Risk, Kahn Pedersen
André Catry, a leading expert in cyber security and a member of the Kahn Pedersen team, will deliver a keynote at the upcoming State of Cyber Security Sweden conference. In his presentation, André will shed light on the current threats facing the global cyber landscape, with a particular focus on the risks that could impact Swedish society. As Sweden’s IT infrastructure plays a crucial role in ensuring a secure future, André will share his insights and findings on how to bolster our nation’s resilience against these ever-evolving cyber threats.
Coffee break including 1-to-1 meetings
Get acquainted with our unique concept and engage in conversations with other professionals and solution providers from the industry.
Get your energy recoverd with a fresh cup of coffee and some refreshments.
The AI landscape – Detect Bad AI & Respond with Good AI
Laurent Strauss, Cyber Security Strategist of OpenText
In this session we will discuss how you can leverage good AI for better resilience and protection from bad AI and bad actors. Further, we will also discuss how AI should and can be used from a regulatory perspective and discuss AI use cases and value proposition.
The Imbalance of Cyber Security
Joe Michael, Director and Co-Founder of EndpointX & Thomas Berglund, Director, Technical Account Management of Tanium UK Limited
In this session, we will explore the key challenges in building an effective cybersecurity strategy, emphasizing the importance of prioritizing capabilities over individual tools. As organizations navigate an increasingly complex threat landscape, they often struggle to balance investments between technology, skilled personnel, and robust processes. This presentation will offer practical insights into how companies have managed their IT security journeys, sharing valuable lessons learned. Attendees will gain an understanding of why doing the basics well is crucial and how a focus on core capabilities can help organizations achieve a more resilient and balanced cybersecurity posture.
Key take-aways:
- Capabilities before tools, moving the focus away from point solutions
- Balancing investment between capabilities, people and process and doing the basics well
- How companies have navigated their IT security journeys and any lessons learned along the way
Not Today! Radware’s Guide to Outsmarting the Attackers
Nichlas Ströberg, Sales Engineer, Nordic of RADWARE
In today’s rapidly evolving threat landscape, where AI dominates the headlines, enterprises face the critical challenge of safeguarding sensitive data and applications from AI-driven attacks.”
To this perhaps: “In a world where AI isn’t just a buzzword but a weapon in the hands of malicious actors, why are we still failing to effectively mitigate these sophisticated attacks? For nearly three years, we’ve witnessed an alarming rise in AI-driven threats, yet many enterprises continue to lag behind in fortifying their defenses.
What You’ll Learn:
- Emerging Threat Landscape: Understand how AI is being used against application security.
- Sophisticated Threats: Explore real-world examples of attacks that bypass existing defenses.
- Best Practices: Learn practical steps to defend against AI-driven attacks.
- Live Demo: Experience a live demonstration of our Application Security portal.
Equip yourself with actionable best practices and insights into protective measures to stay ahead in the evolving threat landscape. Don’t miss this opportunity to enhance your defenses against AI-powered threats.
Optimize your Data Management Strategy - How to build a Security Data Engine
Matias Cuba, Regional Sales Manager of Cribl
According to IDC, data volumes are growing at 28% CAGR, so in just three years, the total amount of data will double! How are your teams and security tools able to continue collecting, processing, routing, and analysing this data at scale without compromising quality or increasing cost?
Join this session to learn how to build an effective data management strategy:
- Create efficiencies with your security data, tools, and budget
- Enhance threat hunting with federated search-in-place queries on any data, in any format, and in any repository
- Collect and manage security data on your terms
- Eliminate vendor lock-in to create choice and flexibility
Lunchbreak including 1-to-1 meetings
Time to enjoy a fully catered lunch. While enjoying a sandwich, you can continue your scheduled one-on-one meetings and network with your peers.
From Chaos to Calm - Building Business Continuity
Magnus Sletteng, Principal Sales Engineer, Commvault
With on-going, constant breaches it’s not a matter of if or when, but how often an organization will be breached. The familiar, long-established process of keeping a business up-and-running after a system outage or natural disaster has been changed by ransomware. Due to lack of testing, many organizations are unaware of the gaps in their cyber recovery plans.
As cyberattacks become more pervasive and sophisticated, it’s critical to have a robust, adaptable approach to true resilience. In most cases, ransomware attacks backup environments—meaning malicious code is often hidden in backups and even embedded in the hardware used to recover those backups. Recovering that malicious code can make things worse!
Ransomware thrives in chaos. Join our session to learn how to ensure your business continuity.
The Role of Integrated Data Loss Prevention in Navigating the Evolving Cybersecurity Landscape
Christoffer Callender, Senior Manager Solution Engineering, Broadcom
In today’s rapidly evolving digital landscape, Sweden faces increasing cyber threats that necessitate a robust and unified approach to data security. This session will explore the critical importance of integrated Data Loss Prevention (DLP) strategies in safeguarding sensitive information and ensuring compliance with emerging regulations. Attendees will gain insights into common challenges with traditional DLP methods and discover effective solutions to enhance their organization’s cybersecurity posture.
Key Takeaways:
Understanding DLP Challenges: Identify common pitfalls in traditional data protection approaches.
Benefits of Integration: Learn how a unified DLP strategy can streamline processes and strengthen data security.
Practical Implementation: Receive actionable guidance on adopting an integrated DLP framework within your organization.
Learning Points:
Evolving Information Security Risks: Understand the current cyber threat landscape and its implications for data security.
Regulatory Compliance: Explore the role of DLP in meeting new EU cybersecurity regulations.
Strategic Deployment: Gain knowledge on effectively implementing a consolidated DLP strategy tailored to your organization’s needs.
Accelerating Secure Digital Transformation: The Sweden Secure Tech Hub Approach
Sakarias Strand, Project manager, Cybersecurity of Kista Science City
In this session, Sakarias Strand will explore how the Sweden Secure Tech Hub, part of the Sweden ICT European Digital Innovation Hub, is driving secure digital transformation across Sweden. He will discuss the unique synergy between private and public sectors in Kista Science City, highlighting how this collaboration accelerates innovation and adoption of secure digital solutions. Attendees will gain insights into:
- The role of science parks in fostering cybersecurity innovation
- Strategies for bridging the gap between national expertise and local implementation
- How public-private partnerships can enhance secure digital transformation
Are we setting up our users to fail? Rethinking Our Role in User Mistakes
Joakim Kävrestad, Jönköping University
We are well aware of the phrase “The user is the weakest link in security”. This talk seeks to question that notion by exploring what we, the security community, expect of our users. The talk will cover security principles users are expected to adhere to and security situations that users encounter on a daily basis, allowing the audience to judge the feasibility of that current practice. The talk aims to make the audience question that “weak link” notion and instead consider to what extent we sufficiently support our users.
Fika including 1-to-1 meetings
Enjoy a Swedish fika and discuss the lessons learned with your peers. The final one-to-one meetings with our partners will take place.
Cybercrime investigations!
Björn Eriksson, Head Cyber Investigations team - Swedish Cybercrime Centre of Swedish Police Authority
Closing our ‘State of Cyber Security’ event, Bjorn Eriksson, head of the cyber investigations team at the Swedish Cybercrime Centre, will provide invaluable insights into the evolving landscape of cybercrime. With over 20 years of experience as a police officer, and eight years focused on cybercrime investigations, Bjorn will discuss the importance of reporting cybercrimes, highlighting the power of national and international collaboration.
This keynote will delve into effective strategies for preventing cyberattacks and offer actionable steps for organizations to take when facing a breach. Don’t miss this opportunity to learn from one of Sweden’s top cybercrime experts.
CONCLUSION & SUMMARY OF THE DAY
Teodor Axlund, Moderator
Drinks & Network
Thank you for attending State of Cybersecurity Sweden 2024!
After this insightful day filled with new perspectives, it’s time to reflect with all attendees. What will you take home with you? Which presentation did you find the most interesting?
You will be offered a snack and a drink to close the day in style. We hope you look back with us on a successful event.
Who will be speaking?
View our confirmed experts
Curious as to who will speak and what experience they bring? Quickly view our complete expert overview!