HOW TO PREPARE AND RESPOND TO AN AI-DRIVEN THREAT LANDSCAPE IN 2026
AI is now the #1 data exfiltration channel
The data explosion is fuelling new attack surfaces
Identity has become the new geopolitical weapon
10.25
DEFENDING SWEDEN IN THE DIGITAL ERA
Facing Modern Threats - Cyberattacks, drones, and information warfare
Innovation Meets Defense - Civilian technology solving military challenges
Building Resilience - AI, energy, and secure networks for a safer society
10.45
THREATS AT SCALE: GLOBAL CYBERCRIME THROUGH A UNIQUE INTERNET LENS
Uncovering real-time patterns in DDoS campaigns, bot activity, and AI-driven attacks
Revealing how automation fuels massive, targeted assaults on critical infrastructure and digital commerce
Exposing escalating supply chain risks and the evolving tactics of cyber adversaries
11.00
CYBERSECURITY LEADERSHIP: What security leaders must rethink in 2026 and beyond
The new blind spots: Emerging threats that won't appear in risk reports - but will hit your bottom line
Security as a business issue: Why success hinges on people, process, and cross-functional alignment
Compliance doesn’t equal resilience: Building a resilient strategy that adapts to evolving threats and activates the whole organization
11.20
REGULATORY COMPLIANCE & LEGAL STRATEGIES: Strengthening Cyber Resilience in the Age of AI and Evolving EU Standards
Navigate the intersection of AI governance and cybersecurity risk, with a focus on the EU AI Act, NIS2, and ISO 27001
Leverage DORA TLPT in alignment with TIBER-EU and CBEST to proactively test and strengthen your organization’s cyber risk posture
Streamline legal, regulatory, and technical frameworks to meet evolving obligations and build long-term cyber resilience
11.40
HYBRID OPERATIONS IN THE CYBER DOMAIN
Cyber operations, delusive information mixing the traditional boundaries by purpose
Cybersecurity and cyber defense are equally important in securing critical infrastructure. Private sector and public sector cannot be separated
What is your company role in the larger perspective? How cyber resilient are you?
12.00-13.00
Lunch
Theme
Building NextGen Security: Preparing for the Inevitable Attack
13.00
MINIMUM VIABLE COMPANY: Restoring What Matters Most, First
Reduce Mean Time to Recovery (MTTR) across data, cloud apps, and core systems
Lead with clarity under pressure: decision-making strategies during active breaches
Plan for resilience across pre-incident, active response, and post-recovery phases
13.15
COMBATTING COMPLEX CYBERCRIME – The Police Perspective
From Encryption to Data Theft – Understanding the Evolving Threat Landscape
National and International Cooperation – Building Stronger Law Enforcement Partnerships
The Future of Cyber Threats – Emerging Risks and Strategic Challenges
13.30
DDoS & CREDENTIAL STUFFING: Cheap Attacks, Big Risks
Understanding why common low-cost attacks cause high-cost business disruption
Protecting applications from downtime, account takeovers, and data loss
Building proactive, scalable defenses to stay ahead of evolving threats
13.45
DIGITAL TRANSFORMATION OF CYBERSECURITY
Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML
Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots
Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response
14.00
THE INNOVATION IMPERATIVE: Outpacing AI-Driven Adversaries
How attackers use AI to accelerate, disguise, and scale modern intrusions
Why identity is now the primary battleground in cybersecurity
The case for cross-domain visibility across endpoint, identity, and cloud
14.15
TAKE CONTROL IN A WORLD OF UNCERTAINTY. ADAPTIVE THREAT DEFENSE
A cyber storm is gathering – what are the major factors that increase risk?
With increased risk comes increased expectations – what are the most important objectives and control drivers?
How can you build an efficient cyber strategy that results in better outcomes?
14.30-15.00
Networking Break
Theme
AI Integration, Business Security Culture & Human Centric Strategies
15.00
CASE: Swedbank. HUMAN RISK MANAGEMENT: From Awareness to Accountability
Making accountability a leadership priority at every level of the organisation
Equipping employees to recognise and respond to real-world cyber threats
Embedding secure behaviours into everyday workflows through cross-team collaboration
15.15
AI SHAPING THE ROLE OF FUTURE CYBERSECURITY STRATEGIES
How next-gen AI can be leveraged to predict, prevent and respond to emerging threats
AI in Cybersecurity: Opportunities, Privacy Concerns and Ethical Considerations
Practical strategies for integrating advanced AI technologies into existing frameworks
15.30
EXECUTIVE RISK MEETS CYBER REALITY. What Boards Need to Know (and Ask)
Making cyber risks visible and actionable for executive stakeholders
Aligning strategy and compliance while closing real-world security gaps
Enabling board-level engagement through clear metrics and accountability
What emerging threats organisations are probably not thinking about but should
15.45
Security Culture: The Hidden Engine of Cyber Resilience
Prevention beats reaction - build awareness to reduce incident risk
Align with NIS2 & DORA to strengthen compliance and operational readiness
Combine proactive culture with SOC capabilities for faster, smarter incident response
16.00
Case by courtesy of Arctic Wolf: HOW HUMANA BUILT THEIR DEFENSE
16.15
CREATING A STRONG BUSINESS SECURITY CULTURE
People Centric Strategies for 2026. Building a Culture of Awareness and Responsibility
Recognizing and Mitigating Insider Risks: Addressing Vulnerabilities from Within
The Importance of Modern and Resilient Cyber Leaders