{"id":3956,"date":"2019-10-30T09:01:30","date_gmt":"2019-10-30T09:01:30","guid":{"rendered":"https:\/\/heliview.be\/data-driven-business\/?page_id=3956"},"modified":"2025-07-22T06:56:19","modified_gmt":"2025-07-22T06:56:19","slug":"about-the-conference","status":"publish","type":"page","link":"https:\/\/heliview.com\/state-cyber-security-sweden\/about-the-conference\/","title":{"rendered":"About the conference"},"content":{"rendered":"
[vc_row full_width=”stretch_row_content” enable_full_screen=”yes” css=”.vc_custom_1580113592155{background: #ffffff url(https:\/\/heliview.be\/data-driven-business\/wp-content\/uploads\/sites\/65\/2018\/09\/patt2.png?id=1177) !important;}”][vc_column][vc_row_inner][vc_column_inner]
\r\n

The theme of this year<\/h2>\r\n

Uniting Sweden: A.I. vs. A.I.<\/h3> \r\n <\/div>[vc_column_text css=””]From national infrastructure to healthcare and banking, digital systems power every aspect of modern life. But with progress comes exposure. Today\u2019s attackers, be it state actors, cybercriminals, or lone hackers, exploit vulnerabilities with increasing sophistication.<\/p>\n

AI is reshaping the threat landscape.<\/strong> But beyond the hype, what does it really mean for security strategy, governance, and the human element? At State of Cyber Security<\/strong>, we cut through the noise and deliver sharp insights on the real impact of AI \u2014 and how to harness it effectively.<\/p>\n

We\u2019ll also dive deep into urgent challenges like geopolitical risk, supply chain security, Zero Trust, rising regulation, and organizational resilience \u2014 alongside key themes like culture, awareness, and developing tomorrow\u2019s security talent.<\/p>\n

Because no one can face this alone. It takes collaboration, bold thinking, and shared knowledge to protect what matters most.<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=”20px”][\/vc_column][\/vc_row][vc_row][vc_column]

\r\n

<\/h2>\r\n

Topics that will be covered:<\/h3> \r\n <\/div>[vc_tta_accordion title_tag=”h3″ shape=”square” c_icon=”” active_section=”1″][vc_tta_section title=”Destabilizing Societies or Reducing Competitiveness Through Cyber-Attacks” tab_id=”1745410156875-f0d0d6cd-4582″][vc_column_text css=””]This remains a critical concern. Recent reports highlight the evolving nature of cyber threats, with state actors increasingly targeting critical infrastructure and digital services to disrupt societal functions and economic stability. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Current Cyber Attacks: Ransomware, Phishing, DDoS” tab_id=”1745410156887-cbfe6e12-332e”][vc_column_text css=””]These threats continue to be prevalent. Ransomware attacks have become more sophisticated, often involving advanced persistent threats (APTs), while phishing campaigns are increasingly leveraging AI to craft convincing messages.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”NIS2 Directive and Regulatory Compliance” tab_id=”1745410227714-873894ef-9969″][vc_column_text css=””]Sweden is in the process of transposing the NIS2 Directive into national law through the proposed Cybersecurity Act. This legislation aims to enhance cybersecurity across 18 critical sectors, including energy, transport, and healthcare. It introduces stricter requirements for incident reporting, risk management, and supply chain security. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Artificial Intelligence in Cybersecurity” tab_id=”1745410251372-3fa456d9-1158″][vc_column_text css=””]AI is increasingly being integrated into cybersecurity strategies for threat detection, incident response, and predictive analytics. The European Commission has announced significant investments in AI and cybersecurity to bolster digital resilience.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Security Architecture and Cloud Security” tab_id=”1745410283661-566957c8-d0aa”][vc_column_text css=””]With the rise of cloud services, securing cloud infrastructures has become paramount. The EU is working on a cybersecurity certification scheme for cloud services to ensure compliance with stringent privacy and data sovereignty requirements. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Cybersecurity for Emerging Technologies” tab_id=”1745410308935-42c62d4a-31b5″][vc_column_text css=””]As organizations increasingly adopt technologies like IoT, 5G, AI, and quantum computing, the threat landscape evolves. These innovations bring new vulnerabilities that require tailored security approaches. EU policy and Swedish digital strategies are prioritizing resilience for these emerging technologies, with growing investment and regulation in place.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Sweden & Geopolitical tensions” tab_id=”1745410391767-15b90834-8cf4″][vc_column_text css=””]Sweden\u2019s strategic position in Europe, with key roles in the EU and NATO, makes it a prime target for state-sponsored cyber espionage. Hackers may aim to steal intelligence on Swedish policies, military capabilities, or economic strategies. Sweden\u2019s prominence in tech and defense further increases its vulnerability to sophisticated cyberattacks. The current global geopolitical uncertainty\u2014marked by shifting alliances and rising tensions\u2014intensifies the risk, making Sweden\u2019s cybersecurity more critical than ever.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Public-Private Synergy” tab_id=”1745410449483-c0484892-66d2″][vc_column_text css=””]Collaboration between public authorities and private entities is essential for effective cybersecurity. Initiatives like information sharing, joint exercises, and coordinated response plans are being emphasized to enhance collective resilience.\u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”The Human Factor” tab_id=”1745410504707-2b5e45f2-c2b4″][vc_column_text css=””]Human error remains a significant vulnerability. Training programs focusing on cybersecurity awareness, phishing simulations, and promoting a culture of security are crucial in reducing risks associated with the human factor.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”IAM as Strategic Infrastructure: Governance, Compliance & Business Enablement” tab_id=”1746188450403-a00d51f6-6c83″][vc_column_text css=””]IAM isn\u2019t just a technical control \u2014 it\u2019s a strategic pillar. \u00a0IAM\u2019s role in enabling secure digital transformation, meeting regulatory demands like NIS2, and empowering business units through decentralized, governed access.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion]
\r\n View the programme<\/span><\/a>\r\n Tickets<\/span><\/a>\r\n \r\n <\/div>[vc_empty_space height=”20px”][\/vc_column][\/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1684238917860{background-color: #ffffff !important;}”][vc_column]
\r\n

<\/h2>\r\n

Who is this conference for?<\/h3> \r\n <\/div>[vc_column_text css=””]The conference intended target group consists of participants in the following positions:<\/p>\n