top of page
Elegant%20Abstract%20Background_edited.p
CyberSecurity_logo_yleinen_nega.png

AGENDA 2024

20.3.2024

Starting 9AM EET - Helsinki Time

9:00 

Welcome & Opening remarks by our moderator

Jesse Kamras, Journalist & TV-host

 

9:05

Building a Cybersecurity Vision for the Organization 

Johan Boije, VP & CISO, Veikkaus

  • Discover how an aspirational cybersecurity vision can align with and drive business goals.

  • Explore how cybersecurity can not only protect but also enhance your organization's value proposition and competitiveness.

  • Learn strategies to secure commitment from the business and maintain transparency by sharing your cybersecurity vision's progress.

9:25

Advancing into the Future: The Role of AI in Tomorrows Cybersecurity Strategies

Errol Koolmeister, AI & Technology advisor, keynote speaker, The AI Framework 

  • A deep dive into the latest advancements in AI and how they are shaping the future

  • An overview emerging threats and how next-gen AI can be leveraged to predict, prevent, and respond to these evolving challenges

  •  Implications of using advanced AI in cybersecurity, including privacy concerns and responsible AI use, alongside practical strategies for integrating these technologies into existing frameworks

 

9:50

Human Centric Cyber Strategy

Petri Koivisto, CISO, Outokumpu

  • How to reduce cyber risk and protect data

  • Peoples role in cyber security culture

10:10

Networking Break

10:40

Fog of War: Uncertainty of Situational Awareness during a Cyber Attack and Incident Response

Teemu Eronen, Director, Cyber Operations, Wärtsilä

  • Cyber attack and Incident response: Where to start? What did we do?

  • Uncertainty of own and adversary capabilities; Adversary's motive and intent during the cyber campaign

  • The role and importance of Cyber Threat Intelligence: Learning and Sharing

  • Experience: How top management can contribute during and support after the cyber attack?

 

11:10

Navigating the Future: Zero Trust and SSE in Cybersecurity Leadership Strategies

Jugraj Singh, EMEA Presales Consultant, HPE Aruba Networking

  • Strategic Imperative: Emphasizing why Zero Trust and SSE are not just trends but strategic imperatives for cybersecurity leaders.

  • Adaptive Cybersecurity: Highlighting the need for an adaptive approach that evolves with the changing threat landscape.

  • Empowering Cybersecurity Leaders: Providing the tools and insights necessary for cybersecurity leaders to shape resilient and future-ready strategies.

11:30

Evolving Threat Landscape

Becky Pinkard, Managing Director, Global Cyber Operations, Barclays

  • Adapting to Emerging Cybersecurity Challenges

  • Global Shifts and Geopolitical Dynamics in Cybersecurity

11:50

Executive Guide to NIS2 Implementation

Laura Halonen, Cyber Security Consultant, Loihde

  • Building coherent surface for information security in EU

  • Charting and managing of the assets, risks and responsibilities

  • How to find course when lost?

 

12:10

Lunch Break & Networking

13:15

How to stay one step ahead of the attackers with a prevention first strategy?

 Jarno Ahlström, Evangelist, Office of the CTO, Check Point Software Technologies

  • Exploring cyber realities of past, present and future

  • Pre-emptive power of leveraging platformization & AI for prevention

  • Securing tomorrow. Learn about actionable tactics to combat phishing & fraud

13:35

Securing AI-models: Safeguarding the future of Artificial Intelligence

Henning Gaalaas, International Sales Director, Sorasec

  • AI-based solutions influence us and our society - often without our awareness - making decisions that can change the course of our lives

  • Trust and vulnerability in machine learning systems

  • Taxonomy of attacks on machine learning

 

13:55

Malware And Machine Learning

Mikko Hyppönen, Chief Research Officer, WithSecure

  • AI is here, it's real, and it's scary

  • How do we get the upsides without downsides?

  • What should we be doing now

14:15 

Networking Break

14:45

TBA

15:05

Future of SOC: More Security, Less Operations

Dr. Anton Chuvakin, Office of the CISO, Google Cloud

  • The future of SOC looks less like its past

  • AI is part of the future, but engineering-led approach to SOC is more critical

  • Detection and Response of the future will be more heavily automated

15:20

Busting Cyber Security Myths

Etay Maor, Senior Director Security Strategy, Cato Networks

  • What are the top 3 dangerous cybersecurity myths and examples from recent attacks of why they are wrong

  • Understand threat actors TTPs when it comes to modern enterprise architectures

  • Strategic, operational, and tactical approaches to countering these challenges

15:35

The security implications of digital transformation - Understanding our growing vulnerabilities

David Jacoby, Ethical Hacker, Researcher, Advisor, Entrepreneur, Coder, TEDx & Public Speaker

  • Risks in the age of connectivity 

  • The human factor in digital security: The role of human behavior and error in cybersecurity

  • Evolving cybersecurity regulations and standards in a rapidly changing digital landscape

16:05

End of the Day

Did the agenda peak your interest?

Join us at Cyber Security Executive
by the click of a button. 

bottom of page