IN-PERSON

Nordic CISO Executive Summit

7 May 2024 | Elite Marina Tower, Stockholm

7 May 2024
Elite Marina Tower, Stockholm

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Nordic's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Create Alignment with Business to Demonstrate IT & Security’s True Value

Unlock AI’s Potential through Trust, Leadership Buy-In and Governance

Enhance Resiliency to Mitigate Risk

Nordic CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mirela Bønløkke

Rambøll
Head of Cyber and Information Security & CISO

Lars Falch

Novo Nordisk
CISO, Global information Security

Torstein Gimnes Are

Norsk Hydro
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Nordic CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


6 May 2024

18:00 - 21:00  Networking

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Reshaping Developer Effectiveness with Backstage

Tyson Singer headshot

Tyson Singer

Head of Technology and Platforms

Spotify

As Spotify grew, so did their engineering organisation and technology infrastructure. Rapid growth led to increasing complexity which slowed down developer productivity across R&D. Spotify’s platform engineering team realised that to continue innovating at the desired pace, whilst providing exceptional audio experiences to their 602 million users, they needed to free their developers from the chaos. Tyson Singer, Spotify’s Head of Technology and Platforms, shares how their homegrown developer portal, Backstage, helped restore order by fixing the problem at the source: improving the everyday experience of developers.

Join this session to learn:

  • How Backstage empowers developers, enabling them to collaborate and build quality software at scale
  • Why open sourcing the Backstage framework and collaboration with the CNCF (Cloud Native Computing Foundation) led to the developer portal standard
  • How developer portals built on the Backstage open source framework boost productivity by prioritising developer experience

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Communicating Risk to Remain Resilient

Phillip Larbey headshot

Phillip Larbey

Managing Principal & Head of Verizon's Threat Research Advisory Center EMEA

Verizon

Torstein Gimnes Are headshot

Torstein Gimnes Are

CISO

Norsk Hydro

Mirela Bønløkke headshot

Mirela Bønløkke

Head of Cyber and Information Security & CISO

Rambøll

Marc Hofmann headshot

Marc Hofmann

Chief Security Officer

Nordea

Increased regulation is driving greater accountability in the boardroom to understand the cyber threat landscape and recognise and measure risk. Translating different forms of threat intelligence and risk into your business is critical to protecting the organisation and remaining compliant.

Join Verizon as they share insights on the 2024 DBIR publication and a panel discussion with CISOs on translating insights into practice.

In this session, you will learn how to:

  • Frame risk as a business need to enhance leadership understanding of threat landscape
  • Translate key findings of Verizon’s DBIR report into your IT security methodology
  • Identify actions to reduce the gap in your board’s knowledge of threat intelligence

10:00 - 10:45  Executive Boardroom

Threat Intelligence and Third-Party Risk – Doubling Down on Critical Vulnerabilities

Rigo Van den Broeck headshot

Rigo Van den Broeck

EVP, Cyber Security Product Innovation

Mastercard

Peter Granlund headshot

Peter Granlund

CISO

If P&C Insurance

Lars-Gunnar Marklund headshot

Lars-Gunnar Marklund

CISO

Boliden

Kristoffer Sjostrom headshot

Kristoffer Sjostrom

CSO

SEB

The complete entanglement of cyber risk with business risk is becoming increasingly visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organisation. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

*This session is for CISOs only*

10:45 - 11:50  Networking Break

10:55 - 11:45  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:50 - 12:35  Breakout Session

Breaking Through the Risk Haze of Vulnerabilities — Adopting Continuous Threat Exposure Management

Mike Heredia headshot

Mike Heredia

Vice President EMEA & APAC

XM Cyber

82% of security leaders report an increase in the gap between the number of vulnerabilities/exposures in their environment and the ability to remediate them. This situation is becoming worse with every passing month and has created a big disconnect between Cyber Security and IT teams.

To remediate this disconnect and continually improve security posture, organisations are adopting the CTEM (Continuous Threat Exposure Management) framework that was introduced by Gartner.

Join this session and understand why and how to adopt the CTEM framework. Specifically, you will learn:

  • Why this disconnect exists, and what the 5 steps to adopting CTEM are to reduce its impact
  • How to reduce risk and increase efficiency with a comprehensive exposure management approach
  • How to measure and report on security posture improvements to the board

11:50 - 12:35  Executive Boardroom

Creating Scalable Governance to Future-Proof AI in the Cloud

Bart van de Burgt headshot

Bart van de Burgt

Regional VP, Central & Northern Europe

Wiz

Jacob Henricson headshot

Jacob Henricson

Head of IT Strategy and Security

Skanska

Jesper Laurin headshot

Jesper Laurin

CISO

Husqvarna

CISOs recognise the benefits of AI to stay in the innovation race for their organisations. According to Wiz, although 70% of organisations are using cloud-based managed AI services, many are still in the experimentation phase. CISOs must establish a robust governance programme to better support cloud-based AI tools. Ultimately, ensuring a more secure framework to protect assets within the cloud.

Join this session to discuss:

  • Use cases to prioritise when getting started with cloud-based managed AI services
  • Governance structures which outline AI usage whilst maintaining cloud security
  • Policies which ensure data availability, integrity and confidentiality within the cloud

*This session is for CISOs only*

12:35 - 13:30  Lunch Service

13:30 - 14:15  Keynote

Centralised IT Platforms and the Need to Shift Left

Christoph Schuhwerk headshot

Christoph Schuhwerk

CISO in Residence - EMEA

Zscaler

With the rise of centralised, cloud-based IT platforms like SASE, CNAPP, IDM, and XDR in the cybersecurity space, CISOs, CIOs and CTOs can finally control their estate from a single pane of glass. But while a few global rules may be easy to apply initially, the key to lasting success lies in shifting the responsibility for cyber resilience to the employees who know the applications and data in-depth.

In this session, you will learn:

  • How centralised IT platforms support CIO and CISO core responsibilities
  • How to intelligently combine disparate platforms for maximum effectiveness
  • The prerequisites and steps necessary for driving a successful “shift left” strategy

14:15 - 14:30  Break

14:30 - 15:15  Breakout Session

Modern Workforce, Modern Security Strategy

Hjalmar Lundin headshot

Hjalmar Lundin

Nordic & DACH Lead - Chrome Browser Enterprise

Google Chrome Enterprise

Petri Ala-Annala headshot

Petri Ala-Annala

CISO

Nobia

Remote and hybrid work models open the door to a new wave of browser-based cyber threats. With sensitive data constantly flowing online, businesses face escalating risks and costly attacks. This session explores how to fortify your business against cyberattacks by securing the browser—the gateway to your sensitive data—all without disrupting the flow of work.

Join this session and hear from your peers about:

  • The browser's role in a business's security strategy
  • How the browser can secure your workers and company data on managed or non managed devices
  • Managing resources for cybersecurity in a time of economic uncertainty

14:30 - 15:15  Executive Boardroom

Adopting a Risk-Based Approach to Strengthen SecOps and Compliance

Thomas Bille headshot

Thomas Bille

Senior Security Advisor

BlueVoyant

Torben Voigt Olsen headshot

Torben Voigt Olsen

CISO

Novonesis

Måns Westesson headshot

Måns Westesson

CISO

E.ON Nordic

As the attack surface grows, CISOs know they need a holistic view of their security posture to stay safe. Recognised within Gartner’s re-classification of security operations, CISOs must ensure they detect and mitigate third party and internal threats. By adopting a risk-based approach, CISOs can assess cyber maturity, address compliance gaps and ultimately, prioritise how they spend security investment.

Join this Executive Boardroom to discuss how to:

  • Implement a risk-based approach to your SecOps process to better monitor vulnerabilities and remain compliant
  • Strengthen your security strategy to prioritise spend and controls to optimise your SOC and maximise security investment
  • Work towards continual improvement to defend against future threats across the attack surface and prepare for future regulatory obligations

15:15 - 15:45  Networking Break

15:45 - 16:30  Executive Boardroom

Collaborate with Enhanced Data Security to Drive Competitiveness

Andy Buckland headshot

Andy Buckland

Vice President & General Manager, EMEA

Fortanix

Johannes Eriksson headshot

Johannes Eriksson

CSO & CISO

Lantmännen

Lars Falch headshot

Lars Falch

CISO, Global information Security

Novo Nordisk

With the increased adoption of AI to inform business decisions, CISOs must protect data more than ever. By enhancing business modelling through third party collaboration, CISOs can share sensitive data without putting the business at risk. How can CISOs drive competitive advantage through secure data collaboration?

Join this session to discuss strategies on how to:

  • Refine storytelling techniques to influence business units and third parties on importance of securing data
  • Identify skills and policies needed for data security to drive competitive advantage
  • Leverage confidential collaboration to reduce data security complexity and protect your data when at rest, in transit, and in use

*This session is for CISOs only*

16:30 - 16:45  Break

16:45 - 17:30  Keynote

Behind the Swipe — How Security Awareness Impacts us all

Cecilie Fjellhøy headshot

Cecilie Fjellhøy

Speaker on Fraud Detection & Prevention

Star of The Tinder Swindler, Netflix Documentary

Cecilie Fjellhøy never thought she would be a victim of fraud, until it happened to her. Humans innately trust but with more of us building a digital identity online, it is becoming increasingly difficult to discern the friction between security and identity when it matters most. Join Cecilie as she shares her story and highlights the importance of bringing the personal into the security awareness conversation.

In this keynote, you will hear:

  • Lessons learned on the ease with which security breaches can happen
  • Techniques to elevate the personal element of security awareness
  • Insights into breaking down stigma around fraud

17:30 - 18:00  Closing Comments and Prize Drawing

18:00 - 21:00  Networking

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

Reshaping Developer Effectiveness with Backstage

Tyson Singer headshot

Tyson Singer

Head of Technology and Platforms

Spotify

As Spotify grew, so did their engineering organisation and technology infrastructure. Rapid growth led to increasing complexity which slowed down developer productivity across R&D. Spotify’s platform engineering team realised that to continue innovating at the desired pace, whilst providing exceptional audio experiences to their 602 million users, they needed to free their developers from the chaos. Tyson Singer, Spotify’s Head of Technology and Platforms, shares how their homegrown developer portal, Backstage, helped restore order by fixing the problem at the source: improving the everyday experience of developers.

Join this session to learn:

  • How Backstage empowers developers, enabling them to collaborate and build quality software at scale
  • Why open sourcing the Backstage framework and collaboration with the CNCF (Cloud Native Computing Foundation) led to the developer portal standard
  • How developer portals built on the Backstage open source framework boost productivity by prioritising developer experience

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Where Vision Meets Reality — Building Northvolt’s Digital Platform

Fredrik Ohlsson headshot

Fredrik Ohlsson

Vice President Information Technology

Northvolt

With no legacy and an ambition to create a company with high-level digitalization at its core, Northvolt recognised an opportunity to utilise advanced analytics and AI to its advantage. Join Fredrik Ohlsson, CIO at Northvolt as he shares the journey from building greenfield IT infrastructure to cost-effective, sustainable battery production in a few short years.

In this session, Fredrik will share insights into:

  • Building a digital blueprint and incorporating ‘digital at scale’ mindset in the IT organisation
  • Creating a strong data foundation to facilitate use of AI at scale
  • Adopting a culture of fast pace technology adoption

10:00 - 10:45  Executive Boardroom

AI Deployments — How CIOs Must Balance Strategy and Security with Fast Adoption

Jesper Olsen headshot

Jesper Olsen

Chief Security Officer (EMEA North)

Palo Alto Networks

Baste Amble headshot

Baste Amble

Director Global IT Shared Service (CIO)

DNV

Marika Lindström headshot

Marika Lindström

CIO

Paulig Group

The potential of Generative AI to drive IT leaders faster and securely towards their business goals is clear. While these innovations promise to bring tremendous efficiency, protecting organisations during the era of AI will become increasingly difficult. How can IT Leaders better use these technologies to achieve enterprise-wide goals? How can they ensure the adoption of such technologies does not expose the business to unanticipated risks and consequences?

Join this session to explore:

  • Leveraging generative AI to drive business transformation
  • Updating legacy security controls to accelerate use of generative AI
  • Collaborating with business units to formulate user policies, training and guidance

10:45 - 11:50  Networking Break

10:55 - 11:45  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:50 - 12:35  Breakout Session

Translating 9 Spokes of Your Tech Strategy Wheel into Action

Markus Sontheimer headshot

Markus Sontheimer

CIO/CDO

ISS

CIOs navigate diverse technology strategies in their careers, with scalability consistently posing a challenge. Adapting operating models and optimising data are vital, but showcasing IT's value at scale remains pivotal. In this session, Markus Sontheimer, CIO/CDO at ISS will discuss the strategies he has learnt over his career for harmonising and scaling IT assets effectively. 

Join this session to learn more on how to:

  • Understand the framework to structure your IT&D maturity and make strategic decisions
  • Align tech strategy with business objectives through streamlined architecture, governance and cost
  • Communicate how each dimension of your tech strategy demonstrates agility to increase leadership buy-in

11:50 - 12:35  Executive Boardroom

Showcase IT’s Business Value to Enable Digital Objectives

Rasmus Lundgaard Pedersen headshot

Rasmus Lundgaard Pedersen

CIO

OK a.m.b.a

Carina Harders headshot

Carina Harders

CIO

Lantmannen Unibake

Ulrica Holmgren headshot

Ulrica Holmgren

CIO

Newsec

With renewed focus on cost efficiency and achieving ambitious digital objectives, CIOs must strengthen the strategic partnership with the business. By showcasing how IT tools can solve business problems and investing in technology capabilities that support business goals, IT leaders demonstrate their role as business enabler.

Join this session to discuss:

  • Matching the IT roadmap to a business challenge to demonstrate IT’s value
  • Translate the value of IT to the board to increase investment in technology
  • Empower and engage with users to foster a culture of IT ownership and collaboration

12:35 - 13:30  Lunch Service

13:30 - 14:15  Keynote

Centralised IT Platforms and the Need to Shift Left

Christoph Schuhwerk headshot

Christoph Schuhwerk

CISO in Residence - EMEA

Zscaler

With the rise of centralised, cloud-based IT platforms like SASE, CNAPP, IDM, and XDR in the cybersecurity space, CISOs, CIOs and CTOs can finally control their estate from a single pane of glass. But while a few global rules may be easy to apply initially, the key to lasting success lies in shifting the responsibility for cyber resilience to the employees who know the applications and data in-depth.

In this session, you will learn:

  • How centralised IT platforms support CIO and CISO core responsibilities
  • How to intelligently combine disparate platforms for maximum effectiveness
  • The prerequisites and steps necessary for driving a successful “shift left” strategy

14:15 - 14:30  Break

14:30 - 15:15  Breakout Session

The Last Frontier — Driving Digitalisation in the Logistics Industry

Jörgen Hellberg headshot

Jörgen Hellberg

CIO

PostNord

Bringing a logistics group with its roots in 17th century Sweden and Denmark into the digital age is no easy task. It requires a fundamental shift in ways of working; moving from a legacy structure to one with technology as its core driver. Join Jörgen Hellberg, as he details how PostNord are embracing digitalisation to reshape the logistics industry.

14:30 - 15:15  Executive Boardroom

Analysing Your Application Infrastructure Strategy to Enhance Efficiency

Thomas Angelius headshot

Thomas Angelius

Global CIO, Senior Group Director, Ramboll Group

Rambøll

Emil Dahlin headshot

Emil Dahlin

Group CIO

Bravida

Lena Öhrn headshot

Lena Öhrn

CIO

Ekman

Applications can make or break an organisation’s growth. Too many and you create opportunity for inefficiencies; too few and you risk being behind the curve. How can CIOs evolve their application infrastructure to streamline processes and maximise business value?

Join this session to discuss strategies to:

  • Build a business case to rationalise technology and increase resource allocation
  • Create agile IT architecture to evolve with ever-changing business objectives
  • Communicate change and value of applications to senior stakeholders

15:15 - 15:45  Networking Break

15:45 - 16:30  Breakout Session

Tales From the Cybercrime Trenches — A CIO's Reflections on Experiencing a Cyber Attack

Jon Bremnes headshot

Jon Bremnes

CIO, Banking Division

TietoEVRY

With cyberattacks becoming more sophisticated and frequent, it is a challenge for CIOs and CISOs to stay ahead of threats and be ready to react to a breach. How will you and your team respond when the attack takes place? Join Jon Bremnes, CIO, TietoEvry Banking as he shares the story from a complex ransomware attack at TietoEvry. Learn from his experiences and discover what lessons the team learnt in response to the attack.

Join this session to explore the inner workings of a live cyberattack and hear more on:

  • Insights into the incident and conversations that followed
  • Conversations CIOs and CISOs must have with their board now to ensure preparedness for the next attack
  • Discussing steps implemented to mitigate risk and respond better and faster

15:45 - 16:30  Executive Boardroom

Embrace a Holistic View of Data for Faster Decision-Making

Line Storelvmo Holmberg headshot

Line Storelvmo Holmberg

CIO

Vestas

Kristin Helen Andersen headshot

Kristin Helen Andersen

VP, IT

G2 Ocean

Svein Lister headshot

Svein Lister

VP, Global IT

FläktGroup

CIOs know that leveraging good quality data will enable more strategic decision making. However, many organisations are struggling with defining data’s value and ownership before even considering data quality. How can CIOs articulate the business value of data and communicate where data should reside within the IT organisation? By encouraging a holistic view of data, IT leaders can make faster decisions to benefit the business.

Join this session to discuss how to:

  • Enhance data quality from across the IT ecosystem to create strong base from which to define value
  • Refine your IT strategy’s ‘what’ ‘why’ and ‘how’ to demonstrate how data supports business decisions
  • Rethink the role of central data teams to encourage data ownership within the IT organisation

16:30 - 16:45  Break

16:45 - 17:30  Keynote

Behind the Swipe — How Security Awareness Impacts us all

Cecilie Fjellhøy headshot

Cecilie Fjellhøy

Speaker on Fraud Detection & Prevention

Star of The Tinder Swindler, Netflix Documentary

Cecilie Fjellhøy never thought she would be a victim of fraud, until it happened to her. Humans innately trust but with more of us building a digital identity online, it is becoming increasingly difficult to discern the friction between security and identity when it matters most. Join Cecilie as she shares her story and highlights the importance of bringing the personal into the security awareness conversation.

In this keynote, you will hear:

  • Lessons learned on the ease with which security breaches can happen
  • Techniques to elevate the personal element of security awareness
  • Insights into breaking down stigma around fraud

17:30 - 18:00  Closing Comments and Prize Drawing

6 May 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Elite Marina Tower, Stockholm

A block of rooms has been reserved at the Elite Marina Tower, Stockholm at a reduced conference rate. Reservations should be made online or by calling +46 855901746.

Deadline to book using the discounted room rate of kr1890 SEK (plus tax) is 22 April 2024.

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Programme Managers


For inquiries related to this community, please reach out to your dedicated contacts.

Dariush Kashani

Sr. Community Programme Manager

+44 7542 859489

dariush.kashani@gartner.com

Tara Teymoori

Community Programme Manager

+447930242500

tara.teymoori@gartner.com