{"id":6225,"date":"2025-04-17T15:03:45","date_gmt":"2025-04-17T15:03:45","guid":{"rendered":"https:\/\/heliview.com\/state-cyber-security-sweden\/?page_id=6225"},"modified":"2025-04-17T15:03:45","modified_gmt":"2025-04-17T15:03:45","slug":"programme-2024","status":"publish","type":"page","link":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme-2024\/","title":{"rendered":"Programme 2024"},"content":{"rendered":"
[vc_row css=”.vc_custom_1576017595207{padding-top: 30px !important;}”][vc_column][vc_row_inner][vc_column_inner]
\r\n

<\/h2>\r\n

This was the programme of 2024<\/h3> \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Overview of State of Cyber Security” tab_id=”1727428756171-7c3037fb-71df”][vc_single_image image=”6167″ img_size=”” css=””][\/vc_tta_section][vc_tta_section title=”Programme” tab_id=”1727454044887-a6a43676-cb22″][vc_row_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Reception and registration at Bygget Fest<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]Upon arrival, you will be warmly welcomed with coffee and tea, setting the tone for a comfortable and enjoyable event experience.<\/strong><\/p>\n

Bygget fest is a high-standard eventvenue located at: Norrlandsgatan 11, 111 43 Stockholm.<\/p>\n

Located in the center of Stockholm (\u00d6stermalm), easiliy accesible by foot or public transport (T-Centralen & \u00d6stermalmstorg)[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”08:45 – 09:20″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Teodor\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Teodor Axlund<\/a><\/h3>\r\n

Chairman of the day<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Kick-off State of Cybersecurity Sweden 2024<\/h2>\r\n

Teodor Axlund, Chairman of the day<\/h3> \r\n <\/div>[vc_column_text css=””]In a fitting manner, event chair Teodor Axlund will kick off the second edition of the State of Cybersecurity Event. A day full of knowledge and inspiration begins![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:20 – 9:40″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Jesper\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Jesper Larsson<\/a><\/h3>\r\n

IT-Security Researcher, 0x4a<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Magical Defenses: IT Security Insights from the Dark Side of the Internet<\/h2>\r\n

Jesper Larsson, IT-Security Researcher, 0x4A<\/h3> \r\n <\/div>[vc_column_text css=””]This presentation addresses the advanced tactics of modern attackers and practical defense strategies. We explore how attackers exploit vulnerabilities through methods like phishing and social engineering and then shift focus to effective defense mechanisms. Key topics include the importance of robust security concepts and user education to identify and counteract threats. Attendees will gain essential insights into enhancing digital security against evolving cyber threats.<\/p>\n

Jesper Larsson, known from the TV program “Hackad,” will take you on a journey through IT Security Insights from the Dark Side of the Internet during this presentation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:40 – 10:10″ css=””][vc_single_image image=”5992″ img_size=”” css=””][vc_single_image image=”6000″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Andr\u00e9\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Andr\u00e9 Carty<\/a><\/h3>\r\n

Senior Advisor in IT\/Information Security and Cyber Risk, Kahn Pedersen<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Safeguarding Sweden: Navigating the Global Cyber Threat Landscape<\/h2>\r\n

Andr\u00e9 Catry, Senior Advisor in IT\/Information Security and Cyber Risk, Kahn Pedersen<\/h3> \r\n <\/div>[vc_column_text css=””]Andr\u00e9 Catry, a leading expert in cyber security and a member of the Kahn Pedersen team, will deliver a keynote at the upcoming State of Cyber Security Sweden conference. In his presentation, Andr\u00e9 will shed light on the current threats facing the global cyber landscape, with a particular focus on the risks that could impact Swedish society. As Sweden’s IT infrastructure plays a crucial role in ensuring a secure future, Andr\u00e9 will share his insights and findings on how to bolster our nation’s resilience against these ever-evolving cyber threats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:15 – 10:45″ css=””][vc_single_image image=”6004″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Coffee break including 1-to-1 meetings<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]Get acquainted with our unique concept and engage in conversations with other professionals and solution providers from the industry.<\/p>\n

Get your energy recoverd with a fresh cup of coffee and some refreshments.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:50 – 11:30″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Laurent\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Laurent Strauss<\/a><\/h3>\r\n

Cyber Security Strategist, OpenText<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

The AI landscape \u2013 Detect Bad AI & Respond with Good AI<\/h2>\r\n

Laurent Strauss, Cyber Security Strategist of OpenText<\/h3> \r\n <\/div>[vc_column_text css=””]In this session we will discuss how you can leverage good AI for better resilience and protection from bad AI and bad actors. Further, we will also discuss how AI should and can be used from a regulatory perspective and discuss AI use cases and value proposition.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”11:35 – 12:00″ css=””][vc_single_image image=”5993″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Thomas\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Thomas Berglund<\/a><\/h3>\r\n

Director, Technical Account Management of Tanium UK Limited<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n \r\n\r\n
\r\n
\r\n \r\n \"Joe\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Joe Michael<\/a><\/h3>\r\n

Director and Co-Founder of EndpointX<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

The Imbalance of Cyber Security<\/h2>\r\n

Joe Michael, Director and Co-Founder of EndpointX & Thomas Berglund, Director, Technical Account Management of Tanium UK Limited<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, we will explore the key challenges in building an effective cybersecurity strategy, emphasizing the importance of prioritizing capabilities over individual tools. As organizations navigate an increasingly complex threat landscape, they often struggle to balance investments between technology, skilled personnel, and robust processes. This presentation will offer practical insights into how companies have managed their IT security journeys, sharing valuable lessons learned. Attendees will gain an understanding of why doing the basics well is crucial and how a focus on core capabilities can help organizations achieve a more resilient and balanced cybersecurity posture.<\/p>\n

Key take-aways:<\/strong><\/p>\n