AGENDA 2025
19.3.2025
Starting 8AM EET - Helsinki Time
​
8:00
We open the doors - Welcome!
​​
8:00
CEO Briefing - Invite-only
​
9:00
Opening remarks by our moderator
​
9:05
Transition from Cyber awareness to Cyber Security culture ​
Petri Koivisto, CISO, Outokumpu​
​
9:25
Cybersecurity as a Boardroom Priority: Enhancing Executive Engagement
-
The evolving role of cybersecurity in business strategy
-
Real-world impact of cyber incidents on businesses
-
Overcoming communication barriers between IT and the board
9:50
Navigating the Complexity of Global Cyber Regulations
-
Building cybersecurity strategies amid regulatory dynamics
-
Compliance as a competitive advantage: How meeting and exceeding regulatory requirements can be leveraged as a business asset
​
​
10:10
Networking Break
​
10:40
Fortifying the Frontlines: Enhancing National Cyber Resilience in the Face of Global Cyber Warfare ​
​Nataliya Tkachuk, Head of the Information and Cyber Security Directorate, Office of the National Security and Defense Council of Ukraine
11:10
AI and Machine Learning in Cyber Defense
-
Advances in AI that allow for real-time threat analysis and automated responses to security incidents
-
AI-powered security tools: the latest tools powered by AI designed to enhance security postures and preemptively identify vulnerabilities
-
Unlock the potential of AI solutions to streamline incident response workflows, reduce response times, and minimize the impact of cybersecurity incidents
-
Do not miss the opportunity to leverage automating incident response and strengthening your organization’s cyber resilience
​
11:30
Embracing the Human Side of Cybersecurity: Collaboration & Innovation
-
The importance of cross-functional collaboration in cybersecurity
-
How innovation and human ingenuity can outpace cyber threats
​​
11:50
Lunch Break & Networking
​​
12:50
Advanced Ransomware Negotiation Techniques
-
Exploration of how ransomware has evolved and predictions for the future
-
Effective strategies and legal implications in dealing with ransom demands
-
Developing strategies for minimizing ransomware impact and enhance readiness to respond
​
13:10
Understanding the Modern Cyber War Landscape
-
How cyberattack strategies have evolved over time, moving from simple disruptions to more destructive and sophisticated tactics
-
How data has become a crucial asset in cyber warfare, including its use in espionage, sabotage, and misinformation campaigns
-
The importance of proactive cybersecurity strategies in anticipating and mitigating cyber threats
​
​
13:30
Supply Chain Security
-
Third-party risk management: Techniques and technologies for improving visibility and control over third-party risks
-
Real-world examples of supply chain attacks and how leading companies are securing their supply chains
​
13:50
Networking Break
​
14:20
Protecting IoT and OT Environments from Emerging Cyber Threats
-
Protecting industrial systems
-
Embrace the role of artificial intelligence in IoT cybersecurity
-
Latest advancements in securing vast networks of connected devices
​
​
14:40
Cloud Security Challenges - piece of cloud
-
Best practices for managing security across various cloud platforms and mitigating risks from multi-cloud architectures
-
Assessing risks and implementing robust security measures in multi-cloud deployments
-
Optimizing your organization's cloud strategy for digital success
​
15:00
The Next Decade in Cybersecurity: Trends, Predictions, and Revolutionary Ideas
​
​
15:20
End of the Day
​