Nordic CISO Virtual Executive Summit

21 October 2020 | 08:00 - 13:15 CEST

21 October 2020 | 08:00 - 13:15 CEST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Nordic CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Creating a risk-aligned, resilient organisation

Creating business value and supporting agile business operations

Developing and investing in the security workforce of tomorrow

Governing Body Co-Chairs

Thomas Keisu

CISO & VP, Cyber Security and Infrastructure

Antero Päivänsalo



21 October 2020

12:00 - 13:00  CEST Virtual Summit Boardroom

Managing Third-Party Risk with First-Rate Partnership

Mirela Bønløkke headshot

Mirela Bønløkke



Mats Bergdahl headshot

Mats Bergdahl



In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.

Join this session to learn:

  • How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
  • How to get off on the right foot, and to maintain strong partnerships with third parties
  • Technologies that help manage third-party risk

12:00 - 13:00  CEST Virtual Summit Boardroom

Adopting Emerging Technologies – The Secure Way

Thomas Keisu headshot

Thomas Keisu

CISO & VP, Cyber Security and Infrastructure


Janus Friis Bindslev headshot

Janus Friis Bindslev

Chief Digital Risk Officer


As significant technological advances are being made across information communications technology and Artificial Intelligence, these breakthroughs are expected to be highly disruptive and bring about major transformative shifts in how organizations function.

In this roundtable session, CISO peers will discuss:

  • New approaches and security strategies when preparing for and protecting new technology
  • Assessing the risk of emerging technology such as machine learning and robotics, to nanotechnology, biotechnology and quantum computing
  • What new metrics must be considered when adopting game changing new technology "

13:00 - 13:30  CEST Networking

Community Discussion

An informal and interactive opportunity for you to network with peers in small groups. 

11:15 - 12:00  CEST Virtual Summit Keynote

Securing Telenor’s Critical Assets – a Global Cyber Security Transformation

André Årnes headshot

André Årnes


Telenor Group

In this keynote presentation, André Årnes, Telenor Group’s Chief Security Officer, will tell the story of Telenor’s global approach to cyber security.  

This fascinating insight will cover;

  • The Why of cyber security – the importance of security for society and for the company, and how to build BoD and management engagement around a common message?
  • The How – executing upon the strategic objectives through a global security transformation measured through the impact at the local level
  • The What – securing the critical assets and building a culture for security in everything we do

12:00 - 13:00  CEST Virtual Summit Boardroom

The New Language of Risk

Ross McCulloch headshot

Ross McCulloch

Head of Customer Success


Henning Winther headshot

Henning Winther

Director of Information & Security

Danish Crown

From front-line employees to top-level directors, CISO must be able to communicate cyber risk in a way that compels others to act. What metrics, measures, methods and messages resonate in today’s risk environment?

Join your peers in this virtual boardroom to discuss:

  • How organizations are assessing cybersecurity and risk
  • Metrics that matter
  • Tips for improving cybersecurity programs using these metrics

12:00 - 13:00  CEST Virtual Summit Boardroom

Actionable intelligence – Keeping Pace with Threats

Thomas Zuliani headshot

Thomas Zuliani

Information Security & Data Privacy Director


Mihály Veres headshot

Mihály Veres

Information & IT Security Manager

Lindab International

Fredrik Jormin headshot

Fredrik Jormin



Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving threat intelligence program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline, but sifting through a deluge of information with limited resources is no easy task.

Join this session to learn:

  • How CISOs are pinpointing and leveraging actionable threat intelligence
  • Technologies that help automate the identification of emerging threats
  • The evolving nature of today’s threat landscape

12:00 - 13:00  CEST Virtual Summit Boardroom

Recruiting, Developing and Retaining Talent

Torben Voigt Olsen headshot

Torben Voigt Olsen



In a field often described as having “negative unemployment,” CISOs are in a constant battle to hire and retain the talent they need to keep their organizations secure. What does it take in today’s environment to build a strong information security staff, and what does it take to keep them from jumping ship for the next opportunity?

Join this session to learn:

  • Strategies to effectively leverage a remote security workforce
  • Different approaches to building a talent pipeline
  • How to keep security staff engaged, including automation of low-level tasks

09:00 - 10:00  CEST Virtual Summit Boardroom

The Next-Generation CISO

Antero Päivänsalo headshot

Antero Päivänsalo



Christoffer Åkesson headshot

Christoffer Åkesson



Harri Gröning headshot

Harri Gröning

Director, ICT Operations & Information Security


While it may be hard to imagine in today’s digital world, the CISO didn’t always exist. Born of necessity amid a growing cyberthreat landscape, this leadership role has matured to a core member of a strong enterprise C-suite. Yet in a fast-evolving global economy where all norms are challenged, what will it take to move the CISO to the next level?

Join this session to learn:

  • Leadership lessons from the past years of enterprise cybersecurity
  • Variations in reporting structure and scope of responsibility for security executives
  • The CISO of 2030, 2040 and beyond – what’s next?"

09:00 - 10:00  CEST Virtual Summit Boardroom

Securing Cloud Transformation

Karen Højvang Kjeldsen headshot

Karen Højvang Kjeldsen


Stark Group

Organizations continue a push for greater agility and efficacy, and almost all paths involve the cloud. CISOs continue to play a crucial role in ensuring cloud assets operate smoothly and securely, and as the pace of transformation accelerates, security leaders must run even faster to keep up.

Join your peers in this virtual boardroom to discuss:

  • The latest trends in securing cloud operations

  • Communication strategies for ensuring security is at the forefront of deployments

  • Balancing on-prem and cloud with lessons learned in remote work

09:00 - 10:00  CEST Virtual Summit Boardroom

Security Awareness in the Modern Era

Magnus Solberg headshot

Magnus Solberg

VP, Head of Security Governance


Ola Andersson headshot

Ola Andersson


Volvo Cars

Thomas Zakarias headshot

Thomas Zakarias



For many information security leaders, it’s not technology, but people, that form the weakest link in the organization’s defenses. Even personal social media habits can put a large enterprise at risk, and at a time when more employees are working remote, security awareness training must be top-of-mind more than ever before.

Join this virtual boardroom to discuss:

  • Effective strategies for security awareness training, including generational differences
  • How to hold users accountable
  • Gaining buy-in to roll out robust training programs across the organization

10:00 - 10:45  CEST Virtual Summit Keynote

The Root Causes of Cyber Security Vulnerabilities

Pontus Johnson headshot

Pontus Johnson

Center Director

Center for Cyber Defense and information Security KTH

This talk takes a step back to consider the root causes of cyber security vulnerabilities. Why is it that we are having such difficulties securing our software-based systems? 

Prof. Johnson proposes that there are a handful of fundamental, intrinsic properties of software systems that have placed us in the current predicament of remarkable vulnerability to exploitation. 

In the talk, these root causes are reviewed and the extent to which they can be addressed is considered.

10:45 - 11:15  CEST Break

09:00 - 10:00  CEST Virtual Summit Boardroom

Optimizing Security Operations

Lars-Gunnar Marklund headshot

Lars-Gunnar Marklund



Carsten Hvid Challet headshot

Carsten Hvid Challet

Chief Security Officer (CSO), VP


Palle Wiberg headshot

Palle Wiberg

Chief Information Security Officer

3 Sverige

Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.

Join this session to learn:

  • Models for effective insource, outsource and hybrid SOCs
  • Leadership best practices for keeping employees engaged and alert
  • The latest workflows for effective incident response

08:00 - 09:00  CEST Virtual Summit Keynote

Protecting People: the New Perimeter

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy


Andrew Rose headshot

Andrew Rose

Resident CISO, EMEA


As 2020 changes the way we live and work, cyber criminals are adapting as well. With a large proportion of the global workforce now operating outside the office for the foreseeable future, organisations around the world are at a greater risk of cyber threats than ever before. Increased reliance on cloud systems, coupled with potential financial pressure, job insecurity, unfamiliar circumstances, and the general anxiety of a global pandemic have created a perfect cyber storm – and cybercriminals are taking advantage of the situation.

In this session, Ryan Kalember, EVP, Cybersecurity Strategy and Andrew Rose, Resident CISO, EMEA for Proofpoint examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organisation.

Join us to learn more about:  

  • Why social engineering dominates today’s cyber threat landscape
  • How remote work and the move to the cloud has changed the nature of threats
  • The ways in which organisations are building controls to better understand and protect their employees

09:00 - 10:00  CEST Virtual Summit Boardroom

Data Governance as a Business Enabler

Helena Örtholm headshot

Helena Örtholm

Data Protection Officer and Head of Operational Risk Management


Johan Boije af Gennäs headshot

Johan Boije af Gennäs



Data governance and security is an unquestionably crucial exercise for every organisation, especially in an era when privacy regulation is only becoming more complex and severe. Yet even in the absence of any regulation at all, consumers are expecting to hold more control of their data and its use. Organisations that provide these services build trust and loyalty in the marketplace, and in the end, that means revenue.

Join this session to learn:

  • The role your peer CISOs are playing in their organisation’s data governance strategy
  • The way senior business leaders are evaluating data governance and security as a business asset
  • How privacy regulation is shaping business operations and consumer expectations

16:00 - 17:00  CEST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Nordic CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to participate

Please contact your Program Manager to participate.

21 October 2020

Your Community Partners

CISO Thought Leader
Key Partner

Community Programme Manager

For inquiries related to this community, please reach out to your dedicated contact.

Ingvild Hokstad

Programme Manager

+44 (0)1784 268 045