Nordic CISO Virtual Executive Summit
12 October, 2021 | 8:00-11:30 CEST 13 October, 2021 | 8:00-10:45 CEST
12 October, 2021 | 8:00-11:30 CEST 13 October, 2021 | 8:00-10:45 CEST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Nordic CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Balancing Risk Mitigation and Value Creation
Facilitating Secure Decision-Making with Outcome-Driven Metrics
Thriving Amidst Complexity and Uncertainty
Governing Body Co-Chairs
Lars Falch
Novo Nordisk
CISO/CVP, Global Information Security
What to Expect
Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.
Agenda
08:00 - 08:45 CEST Keynote
Leadership in the Face of Crisis
Jere Peltonen
Global Security & Resilience Adviser
Ministry of Foreign Affairs Finland
In the face of crisis there are two kinds of organisations: those who have crisis leadership, and those who have leadership crisis. A crisis is the ultimate test for the organization and leadership. There are distinctive elements and factors that separate those who are successful from those who fail.
Join Jere Peltonen to learn from his diverse experience and background. Jere is a global risk, resilience and security adviser, currently working for the Finnish Foreign Ministry and Diplomatic Service and the Deputy Director of the Nordic Counter Terrorism Network. In this session, Jere will draw on his experience and will relate fascinating anecdotes covering the key attributes and practices of effective leaders in crisis situations.
We will look at:
- Elements of the organizational crisis management capability
- Leadership during crisis
- Psychological factors in crisis management
08:45 - 09:00 CEST Break
09:00 - 10:00 CEST Executive Boardroom
Risk – Measuring What Counts
Torben Voigt Olsen
CISO
Lundbeck
Lars-Gunnar Marklund
CISO
Boliden
Sophisticated enterprise risk management strategy is not necessarily the full mitigation of risk. For most information security executives, strategic risk management describes a cross-organisational framework to assess different areas of risk and determine when accepting those risks is in the net interest of the business. In order to inform strategy and accountability for risk management, CISOs must be able to leverage meaningful metrics and messaging.
Join this session to discuss:
- Metrics that work – and don’t work – in describing information security risk
- The role that the CISO plays in setting risk management strategy
- Effective cross-functional partnerships in risk management
09:00 - 10:00 CEST Executive Boardroom
People – Security’s Hardest Dilemma
Peter Granlund
CISO
If P&C Insurance
Mihály Veres
Information & IT Security Manager
Lindab AB
Despite expanded awareness of security hygiene, well-intentioned users remain a major area of risk for every organisation. There are countless ways in which an individual can become a liability, and the CISO must find ways to educate users against risks that extend from the office to their own living rooms.
Join this session to discuss:
- The latest security awareness training strategies that are resonating with users
- Ways to hold users accountable for good security hygiene
- Techniques to automate meaningful security awareness training
09:00 - 10:00 CEST Executive Boardroom
Identifying the Way Forward in IAM
Thomas Zuliani
Information Security & Data Privacy Director
Pandora
Ola Ponten
CISO
SCA
How are your peers balancing business agility and business security in their identity and access management strategy? Discover how you can benchmark your framework, and learn the most innovative tactics security leaders are using for IAM in their organisations without interrupting core business operations.
In this session, you'll learn more about:
- Standardising and automating IAM across an enterprise
- Methodologies that satisfy users while maintaining adequate access controls in cloud and legacy environments
- Roadmaps for deciding what tools will fit best
10:00 - 11:30 CEST Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
08:00 - 08:45 CEST Keynote
The Nexus Between Data Protection and Cyber Security
Per Anders Eriksson
CISO
ICA Gruppen
Data protection and cybersecurity are both essential to safeguarding the organization against breaches. Traditionally, cybersecurity and data protection communities have remained separate. Cybersecurity is generally perceived as a technical issue, while data privacy and protection is regarded as an issue relating to data access and protecting data from getting into the wrong hands.
In this keynote session, Per Anders Eriksson will present:
- How ICA Gruppen they have organized their data protection
- Best practices for cybersecurity activities
- How to work together to address common objectives
08:45 - 09:00 CEST Break
09:00 - 10:00 CEST Executive Boardroom
Securing the Sprawling Endpoint
Jouni Karvo
CISO
HUS
Jesper Laurin
CISO
Husqvarna
Knut Erik Hauslo
CISO
Politiet
As enterprises increasingly make access to data more fluid and move assets to the cloud, endpoint protection has become vital. These shifting perimeters lack clear definition and require new layers of security through endpoint protection.
This session aims to bring together CISOs to share their journeys of endpoint management, including concerns over vendor validation, data and asset visibility as well as success and failure stories.
Join this discussion to explore:
- Tactics for monitoring a sprawling attack surface of connective devices
- Strategies to identify your most vulnerable endpoints
- How deep learning can offer a multi-layer approach to endpoint security
09:00 - 10:00 CEST Executive Boardroom
Next-Gen Third Party Risk
Mikael Strömbäck
Senior Executive Partner
Gartner
Tom Remberg
CISO
Bane NOR
Topias Salminen
CISO
Oriola
In this era of digital transformation, organisations rely heavily on their third parties, however, third-party relationships come with risks. To help mitigate those risks CISOs much work closely with their partners to ensure security.
Join this session to discuss:
- Strategies to establish a process for continuous assessment and monitoring of third parties
- How to create an accurate inventory of all suppliers within your ecosystem
- What to do when your third party gets breached
09:00 - 10:00 CEST Executive Boardroom
Driving Business Value With Cloud Security Innovation
Lars Falch
CISO/CVP, Global Information Security
Novo Nordisk
Johan Boije af Gennäs
CISO
KONE
Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?
During this peer-discussion you will explore:
- Automation, orchestration, AI and machine learning cloud strategies
- Nuances for hybrid on- and off-premise systems
- Ways to incorporate the cloud into a fully articulated security strategy
Community Programme Manager
For inquiries related to this community, please reach out to your dedicated contact.