Nordic CISO Virtual Executive Summit
21 October 2020 | 08:00 - 13:15 CEST
21 October 2020 | 08:00 - 13:15 CEST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Nordic CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Creating a risk-aligned, resilient organisation
Creating business value and supporting agile business operations
Developing and investing in the security workforce of tomorrow
Governing Body Co-Chairs
Thomas Keisu
Skanska
CISO & VP, Cyber Security and Infrastructure
Antero Päivänsalo
Nokia
CISO
Agenda
21 October 2020
11:15 - 12:00 CEST Virtual Summit Keynote
Securing Telenor’s Critical Assets – a Global Cyber Security Transformation
André Årnes
SVP & CSO
Telenor Group
In this keynote presentation, André Årnes, Telenor Group’s Chief Security Officer, will tell the story of Telenor’s global approach to cyber security.
This fascinating insight will cover;
- The Why of cyber security – the importance of security for society and for the company, and how to build BoD and management engagement around a common message?
- The How – executing upon the strategic objectives through a global security transformation measured through the impact at the local level
- The What – securing the critical assets and building a culture for security in everything we do
12:00 - 13:00 CEST Virtual Summit Boardroom
Recruiting, Developing and Retaining Talent
Torben Voigt Olsen
CISO
Lundbeck
In a field often described as having “negative unemployment,” CISOs are in a constant battle to hire and retain the talent they need to keep their organizations secure. What does it take in today’s environment to build a strong information security staff, and what does it take to keep them from jumping ship for the next opportunity?
Join this session to learn:
- Strategies to effectively leverage a remote security workforce
- Different approaches to building a talent pipeline
- How to keep security staff engaged, including automation of low-level tasks
12:00 - 13:00 CEST Virtual Summit Boardroom
Actionable intelligence – Keeping Pace with Threats
Thomas Zuliani
Information Security & Data Privacy Director
Pandora
Mihály Veres
Information & IT Security Manager
Lindab International
Fredrik Jormin
CISO
Ving
Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving threat intelligence program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline, but sifting through a deluge of information with limited resources is no easy task.
Join this session to learn:
- How CISOs are pinpointing and leveraging actionable threat intelligence
- Technologies that help automate the identification of emerging threats
- The evolving nature of today’s threat landscape
12:00 - 13:00 CEST Virtual Summit Boardroom
Adopting Emerging Technologies – The Secure Way
Thomas Keisu
CISO & VP, Cyber Security and Infrastructure
Skanska
Janus Friis Bindslev
Chief Digital Risk Officer
PensionDanmark
As significant technological advances are being made across information communications technology and Artificial Intelligence, these breakthroughs are expected to be highly disruptive and bring about major transformative shifts in how organizations function.
In this roundtable session, CISO peers will discuss:
- New approaches and security strategies when preparing for and protecting new technology
- Assessing the risk of emerging technology such as machine learning and robotics, to nanotechnology, biotechnology and quantum computing
- What new metrics must be considered when adopting game changing new technology "
12:00 - 13:00 CEST Virtual Summit Boardroom
Managing Third-Party Risk with First-Rate Partnership
Mirela Bønløkke
CISO
Rambøll
Mats Bergdahl
CISO
Swedavia
In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.
Join this session to learn:
- How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
- How to get off on the right foot, and to maintain strong partnerships with third parties
- Technologies that help manage third-party risk
12:00 - 13:00 CEST Virtual Summit Boardroom
The New Language of Risk
Hosted by BitSight Technologies
Ross McCulloch
Head of Customer Success
BitSight
Henning Winther
Director of Information & Security
Danish Crown
From front-line employees to top-level directors, CISO must be able to communicate cyber risk in a way that compels others to act. What metrics, measures, methods and messages resonate in today’s risk environment?
Join your peers in this virtual boardroom to discuss:
- How organizations are assessing cybersecurity and risk
- Metrics that matter
- Tips for improving cybersecurity programs using these metrics
13:00 - 13:30 CEST Networking
Community Discussion
An informal and interactive opportunity for you to network with peers in small groups.
08:00 - 09:00 CEST Virtual Summit Keynote
Protecting People: the New Perimeter
Hosted by Proofpoint
Ryan Kalember
EVP, Cybersecurity Strategy
Proofpoint
Andrew Rose
Resident CISO, EMEA
Proofpoint
As 2020 changes the way we live and work, cyber criminals are adapting as well. With a large proportion of the global workforce now operating outside the office for the foreseeable future, organisations around the world are at a greater risk of cyber threats than ever before. Increased reliance on cloud systems, coupled with potential financial pressure, job insecurity, unfamiliar circumstances, and the general anxiety of a global pandemic have created a perfect cyber storm – and cybercriminals are taking advantage of the situation.
In this session, Ryan Kalember, EVP, Cybersecurity Strategy and Andrew Rose, Resident CISO, EMEA for Proofpoint examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organisation.
Join us to learn more about:
- Why social engineering dominates today’s cyber threat landscape
- How remote work and the move to the cloud has changed the nature of threats
- The ways in which organisations are building controls to better understand and protect their employees
09:00 - 10:00 CEST Virtual Summit Boardroom
Data Governance as a Business Enabler
Helena Örtholm
Data Protection Officer and Head of Operational Risk Management
Tele2
Johan Boije af Gennäs
CISO
KONE
Data governance and security is an unquestionably crucial exercise for every organisation, especially in an era when privacy regulation is only becoming more complex and severe. Yet even in the absence of any regulation at all, consumers are expecting to hold more control of their data and its use. Organisations that provide these services build trust and loyalty in the marketplace, and in the end, that means revenue.
Join this session to learn:
- The role your peer CISOs are playing in their organisation’s data governance strategy
- The way senior business leaders are evaluating data governance and security as a business asset
- How privacy regulation is shaping business operations and consumer expectations
09:00 - 10:00 CEST Virtual Summit Boardroom
Securing Cloud Transformation
Karen Højvang Kjeldsen
CISO
Stark Group
Organizations continue a push for greater agility and efficacy, and almost all paths involve the cloud. CISOs continue to play a crucial role in ensuring cloud assets operate smoothly and securely, and as the pace of transformation accelerates, security leaders must run even faster to keep up.
Join your peers in this virtual boardroom to discuss:
The latest trends in securing cloud operations
Communication strategies for ensuring security is at the forefront of deployments
Balancing on-prem and cloud with lessons learned in remote work
09:00 - 10:00 CEST Virtual Summit Boardroom
Optimizing Security Operations
Lars-Gunnar Marklund
CISO
Boliden
Carsten Hvid Challet
Chief Security Officer (CSO), VP
KMD
Palle Wiberg
Chief Information Security Officer
3 Sverige
Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.
Join this session to learn:
- Models for effective insource, outsource and hybrid SOCs
- Leadership best practices for keeping employees engaged and alert
- The latest workflows for effective incident response
09:00 - 10:00 CEST Virtual Summit Boardroom
Security Awareness in the Modern Era
Magnus Solberg
VP, Head of Security Governance
Storebrand
Ola Andersson
CISO
Volvo Cars
Thomas Zakarias
CISO
DSV
For many information security leaders, it’s not technology, but people, that form the weakest link in the organization’s defenses. Even personal social media habits can put a large enterprise at risk, and at a time when more employees are working remote, security awareness training must be top-of-mind more than ever before.
Join this virtual boardroom to discuss:
- Effective strategies for security awareness training, including generational differences
- How to hold users accountable
- Gaining buy-in to roll out robust training programs across the organization
09:00 - 10:00 CEST Virtual Summit Boardroom
The Next-Generation CISO
Antero Päivänsalo
CISO
Nokia
Christoffer Åkesson
CISO
Getinge
Harri Gröning
Director, ICT Operations & Information Security
Fazer
While it may be hard to imagine in today’s digital world, the CISO didn’t always exist. Born of necessity amid a growing cyberthreat landscape, this leadership role has matured to a core member of a strong enterprise C-suite. Yet in a fast-evolving global economy where all norms are challenged, what will it take to move the CISO to the next level?
Join this session to learn:
- Leadership lessons from the past years of enterprise cybersecurity
- Variations in reporting structure and scope of responsibility for security executives
- The CISO of 2030, 2040 and beyond – what’s next?"
10:00 - 10:45 CEST Virtual Summit Keynote
The Root Causes of Cyber Security Vulnerabilities
Pontus Johnson
Center Director
Center for Cyber Defense and information Security KTH
This talk takes a step back to consider the root causes of cyber security vulnerabilities. Why is it that we are having such difficulties securing our software-based systems?
Prof. Johnson proposes that there are a handful of fundamental, intrinsic properties of software systems that have placed us in the current predicament of remarkable vulnerability to exploitation.
In the talk, these root causes are reviewed and the extent to which they can be addressed is considered.
10:45 - 11:15 CEST Break
16:00 - 17:00 CEST Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.
Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.
- Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Nordic CISO Virtual Executive Summit peers.
- All conversations are private and will not be recorded
- Meet up to 3 peers based on your shared interests or priorities
Participant Testimonials
- ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
- ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
- ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes
How to participate
Please contact your Program Manager to participate.
21 October 2020
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.