top of page
Elegant%20Abstract%20Background_edited.p
CyberSecurity_logo_yleinen_nega.png

AGENDA 2025

19.3.2025

Starting 8AM EET - Helsinki Time

​

8:00

We open the doors - Welcome!

​​

8:00

CEO Briefing - Invite-only

​

9:00 

Opening remarks by our moderator

Jesse Kamras

​

9:05 KEYNOTE

Transition from Cyber awareness to Cyber Security culture â€‹

Petri Koivisto, CISO, Outokumpu​

​

9:25

Cybersecurity as a Boardroom Priority: Enhancing Executive Engagement

  • The evolving role of cybersecurity in business strategy

  • Real-world impact of cyber incidents on businesses

  • Overcoming communication barriers between IT and the board

 

9:45

Navigating the Complexity of Global Cyber Regulations

  • Building cybersecurity strategies amid regulatory dynamics

  • Compliance as a competitive advantage: How meeting and exceeding regulatory requirements can be leveraged as a business asset

​

​

10:05

Networking Break

​

10:35 KEYNOTE

Fortifying the Frontlines: Enhancing National Cyber Resilience in the Face of Global Cyber Warfare â€‹

​Nataliya Tkachuk, Head of the Information and Cyber Security Directorate, Office of the National Security and Defense Council of Ukraine

 

11:00

AI and Machine Learning in Cyber Defense

  • Advances in AI that allow for real-time threat analysis and automated responses to security incidents

  • AI-powered security tools: the latest tools powered by AI designed to enhance security postures and preemptively identify vulnerabilities

  • Unlock the potential of AI solutions to streamline incident response workflows, reduce response times, and minimize the impact of cybersecurity incidents

  • Do not miss the opportunity to leverage automating incident response and strengthening your organization’s cyber resilience

​

11:20

Embracing the Human Side of Cybersecurity: Collaboration & Innovation

  • The importance of cross-functional collaboration in cybersecurity

  • How innovation and human ingenuity can outpace cyber threats

​​

11:40

Lunch Break & Networking

​​

12:40

Advanced Ransomware Negotiation Techniques

  • Exploration of how ransomware has evolved and predictions for the future

  • Effective strategies and legal implications in dealing with ransom demands

  • Developing strategies for minimizing ransomware impact and enhance readiness to respond

​

13:00

Human risks and human solutions - Behavioral risks in cybersecurity

Jori Grym, Behavioral Strategist

  • How to spot behavioral warning signs early

  • Identifying patterns and behaviors that may indicate insider threats, negligence, or increased risk of data breaches.

  • Future of cybersecurity and human behavior: Preparing for the next generation of threats

​

​

13:20

Cloud Security Challenges - Piece of Cloud

  • Best practices for managing security across various cloud platforms and mitigating risks from multi-cloud architectures

  • Assessing risks and implementing robust security measures in multi-cloud deployments

  • Optimizing your organization's cloud strategy for digital success

​

13:40

Understanding the Modern Cyber War Landscape

  • How cyberattack strategies have evolved over time, moving from simple disruptions to more destructive and sophisticated tactics

  • How data has become a crucial asset in cyber warfare, including its use in espionage, sabotage, and misinformation campaigns

  • The importance of proactive cybersecurity strategies in anticipating and mitigating cyber threats

​

14:00

Networking Break

​

14:30

Protecting IoT and OT Environments from Emerging Cyber Threats

  • Protecting industrial systems

  • Embrace the role of artificial intelligence in IoT cybersecurity

  • Latest advancements in securing vast networks of connected devices

​

​

14:50 KEYNOTE

Digital Spies

Ben Owen, Intelligence Expert, Cyber Spy, Co-Founder, The OSINT Group

Danni Brooke, World Glass Investigation Expert, Author, Ex-Covert Police Officer, Co-Founder, The OSINT Group

  • Infiltrating a Top CIO's Digital Life
    Explore the methods and outcomes of a deep-dive investigation into a CIO’s digital footprint, illustrating vulnerabilities and preventative measures.

  • Behind-the-Scenes: Tracking an FBI Top 10 Fugitive Across Europe
    Gain insights into the use of advanced OSINT and physical investigative techniques in a high-stakes international manhunt.

​​​​

​

15:30

End of the Day Remarks by our Moderators 

Jesse Kamras & Peter Nyman

​

Did the agenda peak your interest?

Join us at Cyber Security Executive
by the click of a button. 

bottom of page