The Future of IT & Cybersecurity

CIO & CISO Think Tank

April 11, 2024 - Nordics

Visionaries

Emil Broholm Schneider Electric
Emil Broholm

Head of IT, BeNe, Nordics & Baltics

Schneider Electric

Think Tank Speaker

Founded in 1836, Schneider Electric provides energy and automation digital solutions for efficiency and sustainability, while combining energy technologies, real-time automation, software and services into integrated solutions for homes, buildings, data centers, infrastructure and industries. Schneider Electric is based in Malmaison, France.

Hanne M. Hansen Energinet & Ørsted
Hanne M. Hansen

Former Director, CISO

Energinet & Ørsted

Think Tank Speaker

Hanne is former Director, Chief Information Security Officer at Energinet, an independent public enterprise owned by the Danish Ministry of Climate and Energy. 38 years of experience from various positions in Financial Institutes and the Energy Sector has helped her form a holistic perspective and enables her to interpret business needs and articulate end to end solutions in a highly complex heterogeneous environment. Nordea Bank is where she has spent most of her career gaining an in-depth knowledge of all involved areas, from strategy and tactical to operational experience. She holds an MBA from Henley London and Ppg.DIP GRC from Oxford.

Azeem Aleem Sygnia
Azeem Aleem

Managing Director (MD) Client Leadership, EMEA

Sygnia

Think Tank Speaker

An experienced information security executive with over 15 years of practitioner experience in cyber defence technologies, security operations, counter threat intelligence, data analytics and behavioural classification of cyber criminal. Within the domain of organisational operations Azeem has an extensive experience in managing P&L, driving operational excellence, change management and process reengineering. Azeem has been at the forefront of architecting cyber resilience capability against Advanced Persistent Threats (APT) for some of the best financial, government and public sector organisations across Europe, the US, Asia and the Middle East. He has worked extensively with the national and international law enforcement agencies around intelligence training, detection and investigation of cyber crime. As a subject matter expert, he has made frequent appearance on regional television and radio programmes as an expert on cyber threats. A published book author and academic criminologist, he has also authored several periodical on advanced security threats in peer reviewed journals and security magazines. He is an eminent plenary conference guest speaker both at the national and international level.

Andy Jenkinson
Andrew Jenkinson

Cyber Security, Public Key Infrastructure, CEO

Cybersec Innovation Partners Ltd

Think Tank Speaker

Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years' experience as a hands-on lateral thinking CEO, coach, and leader. A 'big deal' business accelerator, and inspira- tional, lateral thinker, Andy has crafted, created, and been responsible for delivering 100’s £mil- lions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world's largest, leading organisations. Andy has a demonstrable track record of large-scale technical de- livery and management within many sectors including the Professional, Managed, and Financial Services. Andy was one of the first, and very few people to discover the plethora of insecure SolarWinds domains post their massive cyberattack in 2020. It has since been proven that Andy’s version of the attack (and hundreds of others) that an insecure subdomain being hijacked and replaced by a nefarious website being stood up, has now become common knowledge. It has subsequently been accepted as being the initial access and root cause of the initial infiltration (Sunburst). Andy’s research and paper was presented to the United States Senate Intelligence Committee overseeing the SolarWinds breach in January 2021. Following on from the success of Andy’s first book, Stuxnet to Sunburst, 20 years of digital ex- ploitation and cyber warfare, Andy’s second book which collated his experience and in-depth research of over 1000 companies, all of whom have been victims of cyber and ransomware attacks is titled Ransomware and Cybercrime. This book was published in June 2022. In 2022 Andy was commissioned to author his third book on the Ukraine and Russian cyberwars that acted as a precursor to the all-out offensive that commenced on the 24 February 2022. This book is titled Digital Blood on Their Hands.

Morten Lantow DSV
Morten Lantow

Head of Machine Learning Operations

DSV

Think Tank Speaker

Morten Lantow offers a background rich in hands-on technical expertise and strategic leadership within the machine learning domain. Initially contributing as a Machine Learning platform engineer, Morten evolved his career into a consultancy role at EY, where he was instrumental in spearheading the Danish MLOps offering. His transition from engineering to consultancy underscores a broadened perspective on the challenges and strategies pivotal to executing successful machine learning operations. Currently leading the Machine Learning Operations team at DSV - Global Transport and Logistics, Morten's approach is characterized by a pragmatic and understated leadership style, focusing on empowering his team to build robust ML systems within strict regulatory standards. His participation in the panel will shed light on the nuanced process of talent acquisition in the MLOps sector, offering insights into how these efforts are crucial for the foundational success of machine learning projects.

Ian Golding Netskope
Ian Golding

Interim CIO

Netskope

Think Tank Speaker

Ian has been a CIO / CTO leading global commercial technology programmes for over 20 years. He has been CIO at several leading sustainably consultancies and also Interim CIO at the Natural History Museum where he led the organisation's Technology Strategy and Vision to support its dual role as a centre of excellence in leading scientific research and a world-leading museum. He has also worked in interim leadership roles at SThree Plc, the RNLI and Southern Housing Group. Ian has a passion for fostering collaboration and innovation to exploit the benefits of technology and data . He is also an investor who mentors digital startups. By devoting time to helping emerging businesses, his aim is to help grow the digital ecosystem.

Jochen Raymaekers Ping Identity
Jochen Raymaekers

Principal Solution Architect

Ping Identity

Think Tank Speaker

Jochen Raymaekers is a Principal Solution Architect at Ping Identity, and is helping business solving complex IAM issues in the Northern Europe territory. Over the past 12 years, Jochen has performed full IAM implementations, from developer to architect, security architecture reviews, security assessments, and penetration tests of different systems and devices.

Dan Snape OBE Cutover
Dan Snape OBE

Cyber Resilience Strategist (advising Cutover)

Cutover

Think Tank Speaker

Dan is a strategist with considerable hands-on operational leadership experience in Defence where he was on the frontline of the cyber conflict. He led the formation of government strategy to achieve national cyber resilience and directed investment prioritisation for one of the largest cyber security budgets globally. Passionate about tackling the underlying human challenges to effective cyber security, he loves solving wicked problems, developing energised teams and steering organisations through transformative change

April 11, 2024

Agenda

All times Central European Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Security Resilience: Strategic Cyber Readiness

In the ever-evolving landscape of cybersecurity, executives at the helm bear a critical responsibility. They must not only proactively fortify cyber resilience but also swiftly navigate responses to thwart attacks within organizational networks. This session delves deep into the essential traits required to achieve cyber resilience and readiness. It emphasizes that cyber readiness extends beyond mere static preparedness; instead, it embodies a continuous vigilance. Organizations must assess their standing, prepare comprehensively, simulate attacks to refine security measures, promptly detect and neutralize threats, and respond and recover swiftly to minimize business impact. This comprehensive approach serves as the bedrock for maintaining organizational continuity and bolstering the overall security posture amidst the dynamic cybersecurity landscape.

10:10 AM-10:35 AM
Keynote

Tactics Tool and Procedures? Where the rubber meets the road: Learning from a Heavyweight Attack

In recent years, the Sygnia Incident Response Team has handled numerous nation-state attacks that employed unique attack techniques and posed new challenges to security leaders and incident responders.
In this talk we will guide you through the anatomy of a real-world attack we recently responded to, including attacker TTPs and effective response procedures. This case study will highlight the common pitfalls and key opportunities when defending against even the most sophisticated attacks.

In partnership with:
Sygnia

10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:15 AM
Vision Voices

The Necessity of Transformation, Agility and Embracing Emerging Green Technologies within the Business.

FLSmidth Cement's recent transformation journey signifies a significant shift beyond mere aesthetics. With a continued focus on evolution, the company is transitioning into a leaner, pure-play entity, concentrated on delivering products and services crucial for facilitating the green transition and achieving sustainable growth.

Christopher Ashworth, President of FLSmidth Cement, will speak on the necessity of this transformation, embracing emerging green technologies and prioritising core offerings within the business.


11:15 AM-12:00 PM
Panel

Gen AI - The Hype, The Story & Cybersecurity

GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.


12:05 PM-12:20 PM
Disruptor

Shaping Effective Cybersecurity Function in the Times of AI

As leaders in both technology and cybersecurity, we're constantly grappling with the complexities of safeguarding our digital infrastructure. This challenge is compounded by evolving regulations that require us to remain vigilant while adapting to rapid technology where innovation often outpaces regulation.

In this working group discussion, we'll explore actionable strategies and real-world experiences to bolster our organizations' defenses in the age of AI.

Through open dialogue and shared insights, this session aims to provide practical guidance for leaders to enhance cybersecurity resilience, leveraging the power of AI without losing sight of the everyday realities we face. Join us as we collaborate to strengthen our organizations' defenses in today's evolving digital landscape.

In partnership with:
Netskope

12:20 PM-1:20 PM

Lunch and Networking


1:20 PM-2:10 PM
Panel

Navigating Uncertainty: Building IT Resilience in a Digital Age

In an ever-evolving world fraught with uncertainty, the panel discusses strategies and practical measures for cultivating IT resilience. The thought leaders will delve into leveraging technology to adapt, innovate, and thrive amidst volatility, complexity, uncertainty, and ambiguity (VUCA). Join us for insights into navigating cyber challenges and opportunities of the digital era.

In partnership with:
Cutover.

2:15 PM-2:30 PM
Disruptor

Empower Users with Identity - Navigating to Decentralised Identity

In an age of rampant data breaches and identity theft, empowering users, including your workforce and customers, to autonomously handle and share personal data is reshaping the identity landscape.

Explore decentralised identity principles with us to:
1. Empower your users to securely manage and control personal data, make anonymous identity claims without unnecessary exposure and explicitly authorise data visibility on a need-to-know basis
2. Reduce attack surfaces and minimise risk of breaches tied to vulnerable centralised authorities to enhance organisational privacy and security.

In partnership with:
Ping Identity

2:30 PM-3:00 PM

Networking Break


3:00 PM-3:35 PM
Fireside Chat

Strategic Shifts: Reimagining Engineering Talent Deployment and Management in the Age of GenAI

Unlock insights into the evolving landscape of talent deployment and retention as board expectations drive CIOs to rethink traditional IT talent models. Explore the impact of GenAI on coding processes and the software engineering lifecycle, and discover strategies for optimizing talent allocation and headcounts. Gain actionable insights into defining new roles, cultivating essential skills, and charting GenAI-centric career paths to align with organizational goals and stay ahead in a rapidly changing technological landscape.

In this session we'll explore the evolving landscape of AI maturity and the intricate challenges of talent acquisition within this burgeoning field. Discover strategies to navigate talent shortages, foster innovation, and drive organizational success amidst the rapid evolution of AI technologies


3:35 PM-3:50 PM
Vision Voices

A CISO Needs to Meet Their Board’s Expectations, Communicate Effectively with Them, and Earn Their Trust. What’s the Best Approach?

The CISO plays a critical role in communicating with the board of an organisation, ensuring that cybersecurity concerns are effectively conveyed and understood. This communication involves presenting comprehensive risk assessments, threat landscapes, and the effectiveness of current security measures. The CISO must articulate complex technical concepts in a business-friendly language, emphasising the potential impact of cyber threats on the organisation's overall strategy and objectives. Additionally, regular updates on cybersecurity initiatives, compliance status, and incident response plans are crucial to maintaining the board's confidence. Successful CISO-board communication enhances the organisation's cyber resilience, aligning security efforts with broader business goals.


3:55 PM-4:30 PM
Fireside Chat

Data Empowerment: The IT and Security Leaders Guide to Unlocking Strategic Value Safely

In the era of AI, organizations are harnessing the power of advanced algorithms and predictive analytics to drive unprecedented revenue growth while ensuring robust cybersecurity measures to safeguard sensitive data. This session explores the synergies between artificial intelligence (AI), data analytics, and revenue generation, illuminating how AI-driven insights can revolutionize strategic decision-making and propel businesses forward. Attendees will delve into cutting-edge AI applications such as natural language processing, deep learning, and predictive modeling, uncovering their transformative potential in identifying market opportunities, optimizing pricing strategies, and forecasting revenue streams with precision. Moreover, industry leaders will emphasize the importance of integrating robust cybersecurity protocols into AI and data analytics frameworks to protect against potential cyber threats and data breaches. Through actionable insights, real-world case studies, and best practices, participants will gain invaluable knowledge on effectively leveraging AI while maintaining a secure digital environment.

4:30 PM-4:35 PM

Closing Remarks & Raffle Giveaway


4:35 PM-5:35 PM

Cocktail Networking


In Partnership With