{"id":4917,"date":"2019-12-09T21:50:59","date_gmt":"2019-12-09T21:50:59","guid":{"rendered":"https:\/\/heliview.be\/data-driven-business\/?page_id=4917"},"modified":"2025-12-05T16:23:34","modified_gmt":"2025-12-05T16:23:34","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/","title":{"rendered":"Programme 2025"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1753972074562{padding-top: 30px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;5\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Explore the Programme for State of Cyber Security Sweden 2025<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Curious about what\u2019s in store for the upcoming edition? Dive into our programme packed with inspiring keynotes, thought-provoking panel discussions, and hands-on sessions led by leading experts from Sweden and beyond. Whether you&#8217;re looking for strategic insights or practical tools \u2013 this is where you&#8217;ll find everything you need to stay ahead in the ever-evolving world of cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_empty_space][vc_empty_space][vc_btn title=&#8221;Register&#8221; color=&#8221;peacoc&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fheliview.com%2Fstate-cyber-security-sweden%2Ftickets%2F|title:Register%20&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=&#8221;custom-programma&#8221;][vc_column][vc_empty_space][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Programme 2025&#8243; tab_id=&#8221;1727454044887-a6a43676-cb22&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6442&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Welcome and registration at 7A Posthuset<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Upon arrival, you\u2019ll receive a warm welcome with coffee, tea, and fruit-infused water ready for you. Take this moment to connect with event partners and fellow participants before the program begins.<\/p>\n<p>7A Posthuset is located in the heart of Stockholm, right across from the central station. The building t is one of Stockholm\u2019s most impressive and vibrant venues. Located right across from the Central Station, it combines the city\u2019s historic charm with a modern, elegant design. The building\u2019s grand architecture, high ceilings, and large windows create a bright and inspiring atmosphere<\/p>\n<p><strong>Address<\/strong>: Vasagatan 28, 111 20 Stockholm, Sweden[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;09:00 &#8211; 09:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/teodor-axlund\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2024\/09\/Foto-Teodor-Axlund.jpg\" alt=\"Teodor Axlund\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/teodoraxlund\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/teodor-axlund\/\">Teodor Axlund<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chairman of the day<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Kick-off State of Cybersecurity Sweden 2025<\/h2>\r\n                    <h3 class=\"subheading\">Teodor Axlund, Chairman of the day<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In a fitting manner, event chair Teodor Axlund will kick off the second edition of the State of Cybersecurity Event. A day full of knowledge and inspiration begins![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;09:30 &#8211; 09:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/jan-olsson\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/04\/Jan-Olsson.png\" alt=\"Jan Olsson\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/jan-olsson-987654b5\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/jan-olsson\/\">Jan Olsson<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Police Superintendent \/ Operations Developer of Swedish Police<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Behind the Hack: Staying One Step Ahead<\/h2>\r\n                    <h3 class=\"subheading\">Jan Olsson, Police Superintendent \/ Operations Developer of Swedish Police<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]With each passing day, new and increasingly advanced cyberattacks are published. Pretty much every company and organization has had attacks from cybercriminals and many don&#8217;t even know about it. In a world that is painted more and more like an ongoing\u00a0<strong>Armageddon<\/strong>, one wonders if there are even opportunities to protect oneself and one&#8217;s business. The answer is that it is easy to significantly reduce risks of an attack and significantly minimize damage in the event of a completed attack. What the consequences are of cybercrime, who is behind it, what the Police and other actors are doing and what is fast approaching regarding the new Modus Operandi and of course how to protect yourself are some of the things Jan Olsson intends to lecture about.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6254&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;09:40 &#8211; 10:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/angelique-dawnbringer\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/04\/Angelique.png\" alt=\"Angelique Dawnbringer\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/angeliquedawnbringer\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/angelique-dawnbringer\/\">Angelique Dawnbringer<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Digital Trust and Security Advisor of Business Wellness Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Trust and Resilience: Staying Ahead in a World of Evolving Threats<\/h2>\r\n                    <h3 class=\"subheading\">Angelique Dawnbringer, Digital Trust and Security Advisor of Business Wellness Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As cyber threats continue to evolve, organizations must move beyond reactive strategies to build resilience, establish trust, and strengthen their overall security posture. This session will delve into the critical need for maturing cybersecurity frameworks and adapting to an increasingly dynamic environment. Drawing from real-world incidents and trends, we will discuss how organizations can prioritize resilience, leverage emerging technologies, and actively build trust through transparent, proactive security strategies. We will also explore fostering a culture of continuous improvement to address threats more effectively and support long-term trust and resilience.<\/p>\n<p><strong>Key learnings include:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Understanding the critical gaps in current cybersecurity postures.<\/li>\n<li>Strategies for building resilience through technology and human factors.<\/li>\n<li>Leveraging knowledge, expertise and threat intelligence to anticipate and mitigate risks.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6235&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;10:15 &#8211; 10:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6444&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Coffee-break with 1-1 meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy fresh coffee, tea, fruit-infused water, mineral water, and brain-boosting snacks to recharge and keep your energy high throughout the day.<\/p>\n<p>This is the perfect moment to network with colleagues, speakers, industry peers, and leading solution providers.<\/p>\n<p>The first 1-on-1 meetings also begin here: you decide who to meet and when, giving you the opportunity to discuss the challenges facing your organization.<\/p>\n<p>Check your personal schedule at <strong>eventmanager.heliview.com.<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;10:50 &#8211; 11:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/christoffer-callender\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/06\/Christoffer-Callender.jpg\" alt=\"Christoffer Callender\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/christoffer-callender-4297542\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/christoffer-callender\/\">Christoffer Callender<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Regional Technology Officer EMEA of Broadcom Software<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Securing the Hybrid Enterprise: AI, Zero Trust, and the New Frontline - Your Supply Chain<\/h2>\r\n                    <h3 class=\"subheading\">Christoffer Callender, Regional Technology Officer EMEA of Broadcom by Symantec<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As hybrid work expands and supply chains become more digitized, attackers are shifting focus to the weakest link\u2014your trusted third parties. In this keynote, Christoffer Callender explores how Swedish organizations can\u00a0minimize the risk of supply chain attacks\u00a0by strengthening internal defenses and limiting the blast radius when a third party is compromised.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6419&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:35 &#8211; 12:00&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/dan-jones\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/11\/Oskar-Rodin.png\" alt=\"Dan Jones\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/cyber-dcj\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/dan-jones\/\">Dan Jones<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Security Advisor of Tanium UK Limited<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">The Autonomous Edge: Leading Cybersecurity in the Age of Intelligent Systems<\/h2>\r\n                    <h3 class=\"subheading\">Dan Jones, Senior Security Advisor of Tanium UK Limited<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]<strong>Balancing People, Process, and Technology for\u00a0Resilience, Innovation and Growth<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In 2025, cybersecurity and IT operations reached an inflexion point. With AI, machine learning and autonomous systems now integral to digital infrastructure, leaders are no longer simply defending their IT estate boundaries; they\u2019re\u00a0future-proofing their entire landscape\u00a0in a rapidly evolving operating environment. But as automation and AI become more integral, critical questions emerge:<\/p>\n<ul class=\"checklist\">\n<li>How do you balance business\u00a0resilience, productivity and growth?<\/li>\n<li>Why are endpoint security and management so impactful on business won or lost for every organisation?<\/li>\n<li>Who\u2019s truly in control within your organisation, and what are the external threats your organisation faces?<\/li>\n<li>What happens when humans are removed from the loop?<\/li>\n<li>What leadership traits will define the winners in a hyper-autonomous world?<\/li>\n<li>How can you utilise the latest technologies to improve your team\u2019s effectiveness and work-life balance?<\/li>\n<li>In a fast-paced and volatile world, how do you protect and motivate your people?<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6109&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:35 &#8211; 12:00&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/oskar-rodin\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/10\/Oskar-Rodin.png\" alt=\"Oskar R\u00f6din\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/oskar-rodin-a98380107\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/oskar-rodin\/\">Oskar R\u00f6din<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Enterprise Architect of Check Point Software Technologies B.V.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Building Cyber Resilience In The A.I. Era<\/h2>\r\n                    <h3 class=\"subheading\">Oskar R\u00f6din, Enterprise Architect of Check Point Software Technologies B.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In the A.I. era, the cybersecurity landscape is evolving faster than ever. Attackers are using artificial intelligence to automate, adapt, and scale their tactics \u2014 demanding a new level of resilience from defenders. This session, led by Check Point Software Technologies, explores how organizations can build true cyber resilience by uniting prevention-first strategies, AI-driven security, and a culture of preparedness[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6369&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:05 &#8211; 12:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/marvin-ngoma\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/10\/Marvin-Ngoma.png\" alt=\"Marvin Ngoma\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/marvin-ngoma\/\">Marvin Ngoma<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Sr Security Specialist, Solutions Architect of Elastic<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">From Automation to Adversaries: How A.I. Is Redefining the Modern SOC<\/h2>\r\n                    <h3 class=\"subheading\">Marvin Ngoma, Sr Security Specialist, Solutions Architect of Elastic<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]A.I. has become both our greatest ally and newest adversary. As attackers use automation and machine learning to move faster and hide deeper, defenders are turning to A.I. to fight back. In this session, we\u2019ll explore what A.I.-driven attacks really look like; and how modern SOCs and detection response teams can use the same technology to stay ahead. Through real examples and field insights, you\u2019ll see how A.I. can accelerate detection, triage, and response, helping analysts focus on what truly matters: stopping threats before they stop you.<\/p>\n<p><strong>Learning Outcomes:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>See what A.I.-driven attacks look like in practice and how they\u2019re changing the defender\u2019s playbook.<\/li>\n<li>Learn how A.I. can supercharge SOC operations; from alert triage to incident response.<\/li>\n<li>Understand how to apply A.I. responsibly in detection response and security operations keeping human expertise at the center of defense<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6400&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:05 &#8211; 12:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6445&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Fully catered lunch break with 1-on-1 meetings and networking opportunities<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]It\u2019s time for a fully catered lunch to recharge. Enjoy delicious food while connecting with other participants and speakers. You\u2019ll also have the opportunity to schedule more 1-on-1 meetings with leading industry experts.<\/p>\n<p>Smaklig m\u00e5ltid!<\/p>\n<p>Check your personal schedule at <strong>eventmanager.heliview.com<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;12:35 &#8211; 13:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/emre-suren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/04\/Emre-Suren.png\" alt=\"Emre S\u00fcren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/emres%c3%bcren\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/emre-suren\/\">Emre S\u00fcren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Researcher of Cybercampus Sverige<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">AI in Offensive Security: Key Challenges in LLM-Driven Research<\/h2>\r\n                    <h3 class=\"subheading\">Emre S\u00fcren, Researcher of Cybercampus Sverige<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]IoT devices, once known as \u201csmart devices,\u201d have revolutionized entire industries and are now a key platform for delivering AI-driven services to society. While AI has enhanced everyday appliances with intelligence, it has also opened a new attack surface. As a result, researching vulnerabilities revolving around AI is not just important\u2014it is the thin line between innovation and catastrophe.<\/p>\n<p>This presentation will explore AI security, examining common weaknesses in state-of-the-art LLMs and how AI can be exploited for malicious purposes. It will then shift to AI for security, highlighting to embed AI into vulnerability research to enhance cybersecurity defenses. I will briefly showcase ongoing research in our lab, including fine-tuning LLMs to detect cyber threats and developing ethical hacking agents. Additionally, we will discuss the challenges and limitations of using LLMs in cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6239&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:45 &#8211; 14:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/julius-nicklasson\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/11\/Julius-Nicklasson.png\" alt=\"Julius Nicklasson\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/julius-nicklasson\/\">Julius Nicklasson<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Sales Engineer of Recorded Future<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Hacking the Media: The PR Tactics of Cyber Criminals<\/h2>\r\n                    <h3 class=\"subheading\">Julius Nicklasson, Sales Engineer of Recorded Future<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]This presentation analyzes the direct and indirect engagement strategies cyber criminals use to bolster their reputation, increase extortion pressure on victims, and demand more money for stolen data. Defenders can mitigate the impact of these publicity tactics through preparing an intelligence-led incident response plan that includes external communications strategies.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6473&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:45 &#8211; 14:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/helena-malm\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/04\/Helena-Malm.png\" alt=\"Hel\u00e9na Malm\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/hel%c3%a9na-malm-1650298\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/helena-malm\/\">Hel\u00e9na Malm<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Head of CSO Office of Swedbank AB<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/dzana-dzemidzic\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/04\/Dzana-Dzemidzic.png\" alt=\"Dzana Dzemidzic\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/dzana-d-5006a523\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/dzana-dzemidzic\/\">Dzana Dzemidzic<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Business Information Security Officer of Swedbank AB<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">From Awareness to Accountability<\/h2>\r\n                    <h3 class=\"subheading\">Hel\u00e9na Malm, Head of CSO Office &amp; Dzana Dzemidzic, Business Information Security Officer of Swedbank AB<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In today\u2019s digital age, the \u201cpeople\u201d factor is often overlooked, yet it accounts for 90% of cyber-attacks due to human error or behaviour. Building a strong defence requires more than just technology; it requires a sustainable security culture that evolves over time. This session will explore how employees play a fundamental role in strengthening resilience against escalating cyber threats. Discover strategies to transform security into everyone\u2019s responsibility and learn how to support a lasting culture of security.<\/p>\n<p><b>Key Takeaways<\/b><\/p>\n<ul class=\"checklist\">\n<li>Security Starts from the Top: Leadership plays a crucial role in setting the tone for cybersecurity practices within an organization.<\/li>\n<li>Hackers Don\u2019t Hack Systems, They Hack People: Understanding that humans are often the weakest link underscores the need for comprehensive training and awareness.<\/li>\n<li>Go from Awareness to Accountability: Move beyond only being aware of threats to taking accountability for actions that protect organizational assets.<\/li>\n<li>Collaborate with Your Peers: Strengthen your cyber defence by fostering collaboration across teams and organizations.<\/li>\n<li>Security is Everyone\u2019s Business: Empower every individual in the organization to contribute actively towards maintaining robust cybersecurity defences.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6244&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:15 &#8211; 14:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/johan-rosell\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/10\/Sprekers-logo-website-2.png\" alt=\"Johan Rosell\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/johan-rosell-84023b182\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/johan-rosell\/\">Johan Rosell<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chef f\u00f6r Centrum f\u00f6r Cybers\u00e4kerhet of RISE Research Institutes of Sweden<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Strategies to meet tomorrow\u2019s cybersecurity challenges<\/h2>\r\n                    <h3 class=\"subheading\">Johan Rosell, Chef f\u00f6r Centrum f\u00f6r Cybers\u00e4kerhet of RISE Research Institutes of Sweden<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Centre for Cybersecurity at RISE, Research Institutes of Sweden, is a neutral platform that strengthens Sweden\u2019s cybersecurity through applied research, test environments, and collaboration between industry, academia, and the public sector.\u200b<\/p>\n<p>The role of the centre is to raise awareness of the importance of cyber security and to build Sweden&#8217;s digital resilience. By promoting knowledge exchange, innovation and capacity building, we create the conditions to meet both today&#8217;s and tomorrow&#8217;s cyber challenges. In this presentation I will share strategies to further bolster Sweden\u2019s robustness and resilience in the cyber domain.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6415&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:15 &#8211; 14:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6446&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Fika at the network square with 1-to-1 meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Recharge with a sweet snack, coffee, or tea during our fika break. Enjoy this relaxed moment, it\u2019s also the final opportunity to schedule any remaining 1-on-1 meetings before the program continues.<\/p>\n<p>Check your personal schedule at <strong>eventmanager.heliview.com<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;14:45 &#8211; 15:25&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/nithin-krishna\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/07\/Sprekers-logo-website-1.png\" alt=\"Nithin Krishna\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/cybrnk\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/nithin-krishna\/\">Nithin Krishna<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Head of Cyber Defence Center of Jeppesen Foreflight<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">When A.I. Goes Rogue: Preparing for the Next Generation of Insider Threats<\/h2>\r\n                    <h3 class=\"subheading\">Nithin Krishna, Head of Cyber Defence Center of Jeppesen Foreflight<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Insider threats are no longer just about disgruntled employees or lost USB drives. With generative AI, deepfakes, and autonomous agents in the mix, we\u2019re entering a new phase where threats can come from \u201cinsiders\u201d that aren\u2019t even human. In this session, we\u2019ll break down real-world AI-driven insider threat scenarios, red team simulations, and why traditional DLPs and SIEM rules won\u2019t cut it anymore.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Understand how AI is changing the insider threat landscape<\/li>\n<li>Recognize the risks of AI-augmented insider activity (intentional or accidental)<\/li>\n<li>Learn practical controls and threat modeling strategies for AI misuse<\/li>\n<li>Explore how to balance innovation and security when deploying AI internally<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6379&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:30 &#8211; 15:55&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner disable_element=&#8221;yes&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6250&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Join The Hackathon!<\/h2>\r\n                    <h3 class=\"subheading\">\ud83d\udd10 Put your knowledge to the test. \ud83e\udde0 Score points. \ud83c\udfc6 Win a prize!<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<p class=\"\" data-start=\"262\" data-end=\"468\">During the event, we\u2019re inviting you to take part in a short but exciting <strong data-start=\"347\" data-end=\"374\">cybersecurity Hackathon<\/strong>\u00a0\u2013 a fun and interactive challenge designed to keep you sharp and inspired throughout the day.<\/p>\n<p class=\"\" data-start=\"470\" data-end=\"680\">Whether you\u2019re a seasoned IT professional or simply curious about cybersecurity,\u00a0<strong data-start=\"551\" data-end=\"582\">everyone is welcome to join<\/strong>. The questions will range from general knowledge to topics linked directly to the event sessions.<\/p>\n<p class=\"\" data-start=\"682\" data-end=\"838\"><strong data-start=\"682\" data-end=\"703\">How does it work?<\/strong><br data-start=\"703\" data-end=\"706\" \/>\u27a1\ufe0f Sign up in advance or drop by the\u00a0<strong data-start=\"743\" data-end=\"763\">SIDIA Tech stand<\/strong>\u00a0on the day.<br data-start=\"775\" data-end=\"778\" \/>\u27a1\ufe0f The Hackathon will be live during these three time slots:<\/p>\n<ul>\n<li data-start=\"841\" data-end=\"874\">\u2615\u00a0<strong data-start=\"843\" data-end=\"861\">Morning break:<\/strong>\u00a010 minutes<\/li>\n<li data-start=\"877\" data-end=\"910\">\ud83c\udf7d\ufe0f\u00a0<strong data-start=\"881\" data-end=\"897\">Lunch break:<\/strong>\u00a015 minutes<\/li>\n<li data-start=\"877\" data-end=\"910\">\u2615\u00a0<strong data-start=\"915\" data-end=\"935\">Afternoon break:<\/strong>\u00a010 minutes<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6345&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/tomas-wallin\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/08\/Sprekers-logo-website.png\" alt=\"Tomas Wallin\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/tomas-wallin\/\">Tomas Wallin<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Lieutenant Colonel Swedish Armed Forces Cyber Command of F\u00f6rsvarsmakten<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/sandra-barouta-elvin\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/09\/Sprekers-logo-website-1.png\" alt=\"Sandra Barouta Elvin\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/sandrabaroutaelvin\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/sandra-barouta-elvin\/\">Sandra Barouta Elvin<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Security Officer of Microsoft Sweden<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/karl-selin\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-content\/uploads\/sites\/65\/2025\/10\/Sprekers-logo-website-1.png\" alt=\"Karl Selin\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/karl-s-96317a11\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/speaker\/karl-selin\/\">Karl Selin<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Cyber Security Specialist of National Cyber Security Center<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">The State of Cyber Security Panel Discussion<\/h2>\r\n                    <h3 class=\"subheading\">Linda Nieminen, Cyber and Information Security Consultant at Omegapoint &amp; Margarita Sallinen, Cyber and Information Security Consultant at Omegapoint | Tomas Wallin, Lieutenant Colonel Swedish Armed Forces Cyber Command of F\u00f6rsvarsmakten | Sandra Barouta Elvin, Security Officer of Microsoft Sweden | Karl Selin, Senior Cyber Security Specialist of National Cyber Security Center<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]What cybersecurity challenges do different sectors in Sweden face, and where can they support each other? Join Cyber Chats &amp; Chill hosts Margarita Sallinen and Linda Nieminen as they lead an engaging panel discussion with security experts from the commercial sector, government, and defence.<\/p>\n<p>Each sector deals with its own unique risks and responsibilities, but the cyber threats they face often overlap. Is there one approach that works for all, or do we need tailor-made solutions? And how can we learn from each other?<\/p>\n<p>During this interactive session, security professionals from the following sectors will share their perspectives:<\/p>\n<ul class=\"checklist\">\n<li>Sandra Barouta Elvin &#8211; National Security Officer at Microsoft<\/li>\n<li>Karl Selin &#8211; Senior Cyber Security Specialist at NCSC<\/li>\n<li>Tomas Wallin &#8211;\u00a0Lieutenant Colonel Swedish Armed Forces Cyber Command;<\/li>\n<\/ul>\n<p>There will also be plenty of room to ask your own questions and be part of the conversation.<\/p>\n<p>Don\u2019t miss this unique opportunity to hear first-hand insights from across Sweden\u2019s cybersecurity landscape.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6451&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;6384&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;6396&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;6408&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;16:00 &#8211; 16:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;6447&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">State of Cyber Security Network Drinks<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]After a day full of insights and inspiration, we warmly invite you to the Networking Reception \u2013 the perfect opportunity to continue conversations, exchange ideas, and build valuable connections with fellow attendees.<\/p>\n<p>Enjoy some snacks and drinks as we wrap up this wonderful day.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_btn title=&#8221;16:45 &#8211; 17:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Programme Overview&#8221; tab_id=&#8221;1762762212759-b4284743-b8c3&#8243;][vc_single_image image=&#8221;6454&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1573932805787{padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Who will be speaking?<\/h2>\r\n                    <h3 class=\"subheading\">View our confirmed experts<\/h3>              \r\n              <\/div>[vc_column_text]Curious as to who will speak and what experience they bring? Quickly view our complete expert overview![\/vc_column_text]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"\/state-cyber-security-sweden\/experts\" target=\"_self\"><span>View experts<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1753972074562{padding-top: 30px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]Curious about what\u2019s in store for the upcoming edition? Dive into our programme packed with inspiring keynotes, thought-provoking panel discussions, and hands-on sessions led by leading experts from Sweden and beyond. Whether you&#8217;re looking for strategic insights or practical tools \u2013 this is where you&#8217;ll find [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4917","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>View the programme | State of Cyber Security Sweden<\/title>\r\n<meta name=\"description\" content=\"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"View the programme | State of Cyber Security Sweden\" \/>\r\n<meta property=\"og:description\" content=\"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/\" \/>\r\n<meta property=\"og:site_name\" content=\"State of Cyber Security\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-12-05T16:23:34+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/\",\"url\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/\",\"name\":\"View the programme | State of Cyber Security Sweden\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/#website\"},\"datePublished\":\"2019-12-09T21:50:59+00:00\",\"dateModified\":\"2025-12-05T16:23:34+00:00\",\"description\":\"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programme 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/#website\",\"url\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/\",\"name\":\"State of Cyber Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/state-cyber-security-sweden\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"View the programme | State of Cyber Security Sweden","description":"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/","og_locale":"en_US","og_type":"article","og_title":"View the programme | State of Cyber Security Sweden","og_description":"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations","og_url":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/","og_site_name":"State of Cyber Security","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2025-12-05T16:23:34+00:00","twitter_card":"summary_large_image","twitter_site":"@HeliviewConf","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/","url":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/","name":"View the programme | State of Cyber Security Sweden","isPartOf":{"@id":"https:\/\/heliview.com\/state-cyber-security-sweden\/#website"},"datePublished":"2019-12-09T21:50:59+00:00","dateModified":"2025-12-05T16:23:34+00:00","description":"Various keynotes, break-out sessions, workshops and interactive sessions. With contributions from various organisations","breadcrumb":{"@id":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/state-cyber-security-sweden\/"},{"@type":"ListItem","position":2,"name":"Programme 2025"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/state-cyber-security-sweden\/#website","url":"https:\/\/heliview.com\/state-cyber-security-sweden\/","name":"State of Cyber Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/state-cyber-security-sweden\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/pages\/4917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/comments?post=4917"}],"version-history":[{"count":11,"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/pages\/4917\/revisions"}],"predecessor-version":[{"id":6489,"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/pages\/4917\/revisions\/6489"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/state-cyber-security-sweden\/wp-json\/wp\/v2\/media?parent=4917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}