{"id":6225,"date":"2025-04-17T15:03:45","date_gmt":"2025-04-17T15:03:45","guid":{"rendered":"https:\/\/heliview.com\/state-cyber-security-sweden\/?page_id=6225"},"modified":"2025-04-17T15:03:45","modified_gmt":"2025-04-17T15:03:45","slug":"programme-2024","status":"publish","type":"page","link":"https:\/\/heliview.com\/state-cyber-security-sweden\/programme-2024\/","title":{"rendered":"Programme 2024"},"content":{"rendered":"
Bygget fest is a high-standard eventvenue located at: Norrlandsgatan 11, 111 43 Stockholm.<\/p>\n
Located in the center of Stockholm (\u00d6stermalm), easiliy accesible by foot or public transport (T-Centralen & \u00d6stermalmstorg)[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”08:45 – 09:20″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Jesper Larsson, known from the TV program “Hackad,” will take you on a journey through IT Security Insights from the Dark Side of the Internet during this presentation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:40 – 10:10″ css=””][vc_single_image image=”5992″ img_size=”” css=””][vc_single_image image=”6000″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Get your energy recoverd with a fresh cup of coffee and some refreshments.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:50 – 11:30″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Key take-aways:<\/strong><\/p>\n To this perhaps: “In a world where AI isn\u2019t just a buzzword but a weapon in the hands of malicious actors, why are we still failing to effectively mitigate these sophisticated attacks? For nearly three years, we\u2019ve witnessed an alarming rise in AI-driven threats, yet many enterprises continue to lag behind in fortifying their defenses.<\/p>\n What You\u2019ll Learn:<\/strong><\/p>\n Equip yourself with actionable best practices and insights into protective measures to stay ahead in the evolving threat landscape. Don\u2019t miss this opportunity to enhance your defenses against AI-powered threats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”12:05 – 12:30″ css=””][vc_single_image image=”6104″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Join this session to learn how to build an effective data management strategy:<\/p>\n As cyberattacks become more pervasive and sophisticated, it\u2019s critical to have a robust, adaptable approach to true resilience. In most cases, ransomware attacks backup environments\u2014meaning malicious code is often hidden in backups and even embedded in the hardware used to recover those backups. Recovering that malicious code can make things worse!<\/p>\n Ransomware thrives in chaos. Join our session to learn how to ensure your business continuity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”13:50 – 14:15″ css=””][vc_single_image image=”6120″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Key Takeaways:<\/strong><\/p>\n Understanding DLP Challenges: Identify common pitfalls in traditional data protection approaches.<\/p>\n Benefits of Integration: Learn how a unified DLP strategy can streamline processes and strengthen data security.<\/p>\n Practical Implementation: Receive actionable guidance on adopting an integrated DLP framework within your organization.<\/p>\n Learning Points:<\/strong><\/p>\n Evolving Information Security Risks: Understand the current cyber threat landscape and its implications for data security.<\/p>\n Regulatory Compliance: Explore the role of DLP in meeting new EU cybersecurity regulations.<\/p>\n Strategic Deployment: Gain knowledge on effectively implementing a consolidated DLP strategy tailored to your organization’s needs.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”13:50 – 14:15″ css=””][vc_single_image image=”6173″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n This keynote will delve into effective strategies for preventing cyberattacks and offer actionable steps for organizations to take when facing a breach. Don’t miss this opportunity to learn from one of Sweden’s top cybercrime experts.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”15:40 – 16:10″ css=””][vc_single_image image=”6090″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n \n
\r\n <\/a>\r\n\r\n
Nichlas Str\u00f6berg<\/a><\/h3>\r\n
Sales Engineer, Nordic of RADWARE<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Not Today! Radware\u2019s Guide to Outsmarting the Attackers<\/h2>\r\n
Nichlas Str\u00f6berg, Sales Engineer, Nordic of RADWARE<\/h3> \r\n <\/div>[vc_column_text css=””]In today\u2019s rapidly evolving threat landscape, where AI dominates the headlines, enterprises face the critical challenge of safeguarding sensitive data and applications from AI-driven attacks.”<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Matias Cuba<\/a><\/h3>\r\n
Regional Sales Manager of Cribl<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Optimize your Data Management Strategy - How to build a Security Data Engine<\/h2>\r\n
Matias Cuba, Regional Sales Manager of Cribl<\/h3> \r\n <\/div>[vc_column_text css=””]According to IDC, data volumes are growing at 28% CAGR, so in just three years, the total amount of data will double! How are your teams and security tools able to continue collecting, processing, routing, and analysing this data at scale without compromising quality or increasing cost?<\/p>\n
\n
Lunchbreak including 1-to-1 meetings<\/h2>\r\n
<\/h3> \r\n <\/div>[vc_column_text css=””]Time to enjoy a fully catered lunch. While enjoying a sandwich, you can continue your scheduled one-on-one meetings and network with your peers.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”12:35- 13:45″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n
Magnus Sletteng<\/a><\/h3>\r\n
Principal Sales Engineer of Commvault<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
From Chaos to Calm - Building Business Continuity<\/h2>\r\n
Magnus Sletteng, Principal Sales Engineer, Commvault<\/h3> \r\n <\/div>[vc_column_text css=””]With on-going, constant breaches it\u2019s not a matter of if or when, but how often an organization will be breached. The familiar, long-established process of keeping a business up-and-running after a system outage or natural disaster has been changed by ransomware. Due to lack of testing, many organizations are unaware of the gaps in their cyber recovery plans.<\/p>\n
\r\n <\/a>\r\n\r\n
<\/a><\/h3>\r\n
<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
The Role of Integrated Data Loss Prevention in Navigating the Evolving Cybersecurity Landscape<\/h2>\r\n
Christoffer Callender, Senior Manager Solution Engineering, Broadcom<\/h3> \r\n <\/div>[vc_column_text css=””]In today’s rapidly evolving digital landscape, Sweden faces increasing cyber threats that necessitate a robust and unified approach to data security. This session will explore the critical importance of integrated Data Loss Prevention (DLP) strategies in safeguarding sensitive information and ensuring compliance with emerging regulations. Attendees will gain insights into common challenges with traditional DLP methods and discover effective solutions to enhance their organization’s cybersecurity posture.<\/p>\n
\r\n <\/a>\r\n\r\n
Sakarias Strand<\/a><\/h3>\r\n
Project manager, Cybersecurity of Kista Science City<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Accelerating Secure Digital Transformation: The Sweden Secure Tech Hub Approach<\/h2>\r\n
Sakarias Strand, Project manager, Cybersecurity of Kista Science City<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, Sakarias Strand will explore how the Sweden Secure Tech Hub, part of the Sweden ICT European Digital Innovation Hub, is driving secure digital transformation across Sweden. He will discuss the unique synergy between private and public sectors in Kista Science City, highlighting how this collaboration accelerates innovation and adoption of secure digital solutions. Attendees will gain insights into:<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Joakim K\u00e4vrestad<\/a><\/h3>\r\n
Lecturer & Researcher in Cybersecurity of J\u00f6nk\u00f6ping University<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Are we setting up our users to fail? Rethinking Our Role in User Mistakes<\/h2>\r\n
Joakim K\u00e4vrestad, J\u00f6nk\u00f6ping University<\/h3> \r\n <\/div>[vc_column_text css=””]We are well aware of the phrase “The user is the weakest link in security”. This talk seeks to question that notion by exploring what we, the security community, expect of our users. The talk will cover security principles users are expected to adhere to and security situations that users encounter on a daily basis, allowing the audience to judge the feasibility of that current practice. The talk aims to make the audience question that “weak link” notion and instead consider to what extent we sufficiently support our users.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”14:20 – 14:50″ css=””][vc_single_image image=”6023″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][vc_column_inner width=”2\/3″]
Fika including 1-to-1 meetings<\/h2>\r\n
<\/h3> \r\n <\/div>[vc_column_text css=””]Enjoy a Swedish fika and discuss the lessons learned with your peers. The final one-to-one meetings with our partners will take place.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”14:55 – 15:35″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n
Bj\u00f6rn Eriksson<\/a><\/h3>\r\n
Head Cyber Investigations team - Swedish Cybercrime Centre of Swedish Police Authority<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Cybercrime investigations!<\/h2>\r\n
Bj\u00f6rn Eriksson, Head Cyber Investigations team - Swedish Cybercrime Centre of Swedish Police Authority<\/h3> \r\n <\/div>[vc_column_text css=””]Closing our ‘State of Cyber Security’ event, Bjorn Eriksson, head of the cyber investigations team at the Swedish Cybercrime Centre, will provide invaluable insights into the evolving landscape of cybercrime. With over 20 years of experience as a police officer, and eight years focused on cybercrime investigations, Bjorn will discuss the importance of reporting cybercrimes, highlighting the power of national and international collaboration.<\/p>\n
\r\n <\/a>\r\n\r\n