top of page
Elegant%20Abstract%20Background_edited.p
CyberSecurity_logo_yleinen_nega.png

AGENDA 2025

19.3.2025

Starting 8AM EET - Helsinki Time

​

8:00

We open the doors - Welcome!

​​

8:00

CEO Briefing - Invite-only

​

9:00 

Opening remarks by our moderator

​

9:05

Transition from Cyber awareness to Cyber Security culture â€‹

Petri Koivisto, CISO, Outokumpu​

​

9:25

Cybersecurity as a Boardroom Priority: Enhancing Executive Engagement

  • The evolving role of cybersecurity in business strategy

  • Real-world impact of cyber incidents on businesses

  • Overcoming communication barriers between IT and the board

 

9:50

Navigating the Complexity of Global Cyber Regulations

  • Building cybersecurity strategies amid regulatory dynamics

  • Compliance as a competitive advantage: How meeting and exceeding regulatory requirements can be leveraged as a business asset

​

​

10:10

Networking Break

​

10:40

Fortifying the Frontlines: Enhancing National Cyber Resilience in the Face of Global Cyber Warfare â€‹

​Nataliya Tkachuk, Head of the Information and Cyber Security Directorate, Office of the National Security and Defense Council of Ukraine

 

11:10

AI and Machine Learning in Cyber Defense

  • Advances in AI that allow for real-time threat analysis and automated responses to security incidents

  • AI-powered security tools: the latest tools powered by AI designed to enhance security postures and preemptively identify vulnerabilities

  • Unlock the potential of AI solutions to streamline incident response workflows, reduce response times, and minimize the impact of cybersecurity incidents

  • Do not miss the opportunity to leverage automating incident response and strengthening your organization’s cyber resilience

​

11:30

Embracing the Human Side of Cybersecurity: Collaboration & Innovation

  • The importance of cross-functional collaboration in cybersecurity

  • How innovation and human ingenuity can outpace cyber threats

​​

11:50

Lunch Break & Networking

​​

12:50

Advanced Ransomware Negotiation Techniques

  • Exploration of how ransomware has evolved and predictions for the future

  • Effective strategies and legal implications in dealing with ransom demands

  • Developing strategies for minimizing ransomware impact and enhance readiness to respond

​

13:10

Understanding the Modern Cyber War Landscape

  • How cyberattack strategies have evolved over time, moving from simple disruptions to more destructive and sophisticated tactics

  • How data has become a crucial asset in cyber warfare, including its use in espionage, sabotage, and misinformation campaigns

  • The importance of proactive cybersecurity strategies in anticipating and mitigating cyber threats

​

​

13:30

Supply Chain Security

  • Third-party risk management: Techniques and technologies for improving visibility and control over third-party risks

  • Real-world examples of supply chain attacks and how leading companies are securing their supply chains

​

13:50

Networking Break

​

14:20

Protecting IoT and OT Environments from Emerging Cyber Threats

  • Protecting industrial systems

  • Embrace the role of artificial intelligence in IoT cybersecurity

  • Latest advancements in securing vast networks of connected devices

​

​

14:40

Cloud Security Challenges - piece of cloud

  • Best practices for managing security across various cloud platforms and mitigating risks from multi-cloud architectures

  • Assessing risks and implementing robust security measures in multi-cloud deployments

  • Optimizing your organization's cloud strategy for digital success

​

15:00

The Next Decade in Cybersecurity: Trends, Predictions, and Revolutionary Ideas

​

​

15:20

End of the Day

​

Did the agenda peak your interest?

Join us at Cyber Security Executive
by the click of a button. 

bottom of page