4 March 07:30-18:30Hotel Birger Jarl, Stockholm

2026 Speakers

John Wallhoff
Event Chairman & Moderator

John Wallhoff (CISA, CISM, CISSP), Co-Founder and Board Member at B4 Investigate andformerly the President of ISACA Sweden Chapter & independent advisor. He is an experienced expert in the field of IT-Governance, IT Service Management and Information Security. Over the past 25 years he has been working with a wide range of organisations in different industries/sectors.

Alexandra Searle
Head of Business Operations, Ericsson

Alexandra Searle currently Heading Operations and Transformation in Ericsson's Product Lifecycle Management Space- strong business, security, and compliance experience across global technology and telecommunications. She has led major operational, governance, and transformation programs within Ericsson's Core Networks and Digital Services, integrating security and privacy frameworks into business strategy and execution. With a background spanning compliance, regulatory management, and operational leadership, Alexandra focuses on practical, business-driven approaches to risk, resilience, and secure growth.

Elie El-Feghaly
Cybersecurity Executive & CISP Advisor, Vizrt

Elie El-Feghaly is a Global Chief Security Officer with 20+ years of experience helpingorganizations navigate cybersecurity, digital risk, and business transformation. His career has spanned finance, healthcare, and media industries where resilience and compliance are critical to growth. He works at the intersection of technology, governance, and strategy, advising boards and executive teams on how to turn cybersecurity from a technical problem into a business enabler. He has guided organizations through M&A due diligence, global regulatory shifts (DORA, GDPR, NIS2, ISO, SEC rules), and enterprise transformations that embed security into culture and operations. Beyond his executive role, he leads the CISO community for a venture capital firm, enabling portfolio companies to strengthen governance, share best practices, and raise their cyber maturity. This board-level advisory work has reinforced his focus on risk oversight, investment strategy, and stakeholder trust.

Christian Källqvist
IT Security Architect, Aktiebolaget Svensk Exportkredit(SEK)

Arbetat med operationell och strategisk IT-säkerhet i ett antal år. ITsäkerhetsarkitekt och projektledare med lång erfarenhet av leverantörsstyrning och upphandling/förhandling.

Helena Örtholm
Senior Cybersecurity Governance & Assurance Specialist, Skanska AB

Helena Örtholm started out as a lawyer working for the Swedish House Owners Association assisting the organization and its members with property rights and civil law issues. After some years she shifted focus to personal data rights/privacy issues and contract law, information security and IT audits when started working at EY and then later on at Transcendent Group, and she has been working with these topics as a consultant for approximately 15 years before starting to work as Chief Security Officer at the former TDC in 2013. With the Tele2 acquisition of TDC Helena became CISO and DPO for Tele2 Sweden and with the re-organization of Tele2 due to the ensuing merger with ComHem she held a position as as Group Privacy Officer, Data Protection Officer for Tele2 Sweden and ComHem as well as expanding her role in driving the risk work within the organization as Head of Operational Risk Management. In 2022 Helena joined Skanska Sweden in the role of Informationssäkerhetschef. Since the 1st of January in 2023 she now holds the position of Head of Cybersecurity Governance & Assurance in the new global cybersecurity organization.

Christian Abdelmassih
Senior IT Security Architect, Nordea

Johan Åtting
CISO, Sectra AB

Ronja Ahlberg
Director Cyber Defence, SOFF

Michael Popoff
Senior Scientist, RISE

Michael Popoff is a senior scientist at RISE Research Institutes of Sweden. Michael

works with applied research and helps RISE partners to understand and apply the

latest in digital technologies within privacy preservation, information security,

AI/ML, telecom, IoT, and post-quantum technologies in the public and private

sectors including real estate, agriculture, energy, health, and manufacturing. Michael

holds a PhD in physics from the Royal Institute of Technology (KTH) in Stockholm.

Jabu Mtsweni
Head of Information & Cyber Security Centre, CSIR

Dr Jabu Mtsweni is the Head of Information and Cyber Security Centre and Chief Researcher at the Council for Scientific and Industrial Research (CSIR), NRF-Rated Researcher (C2), and a Certified Cybersecurity Manager, Research Fellow at the Stellenbosch University, and Technical Leader of the National Policy Data Observatory. Dr Jabu Mtsweni is an accomplished researcher and technology expert in the field of Computer Science, particularly in the areas of Cyber and Information Security. He holds a PhD degree in Computer Science from the University of South Africa. He has published over 90 peer-reviewed conference and journal articles over the years in different forums focusing on ICT4development, socially relevant computing, information and cybersecurity, and data science. He regularly speaks as an invited speaker at local and international cybersecurity conferences. He has worked with both the public and private sector in large and complex ICT projects.

Bea Khosravi
IAM Specialist, Vattenfall AB

With a background spanning law, business development, and technology, Bea Khosravi combines a deep understanding of digital identity with hands-on experience from complex security initiatives. In her role at Vattenfall, she works with analysis and strategy within IAM in a large organization. In her talk, Bea will share insights on passkeys—a technology that promises a passwordless, more secure, and more user-friendly alternative for the future of logins. With both clarity and thoughtfulness, she highlights the challenges and opportunities that lie ahead.

Dimitrios Stergiou
CISO, Taptap Send

Dimitrios Stergiou Dimitrios is currently employed as CISO at Taptap Send. He is an experienced senior Information security and Risk professional with over 20 years of experience. Before joining the Taptap Send, Dimitrios held positions at Wayflyer Group, Trustly Group AB, Modern Times Group, NetEnt, Entraction, Innova S.A, and Intracom S.A.Dimitrios holds an M.Sc. in Information Security, as well as an MBA, and is a Certified Lead Implementer for ISO 27001:2013, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Risk and Information Systems Control (CRISC) professional, Certified Cloud Security Professional (CCSP) and Certified Information Systems Security Professional (CISSP). Dimitrios is also a certified Certified Information Privacy Manager (CIPM) and Certified Information Privacy Professional (CIPP/E). Dimitrios' Information Security focus lies with standards compliance, technical security evaluation, risk management, secure development lifecycle, SecDevOps, and social engineering.

Faizal Shabeer
Senior Country Manager – (UK & Europe), EC Council

Faizal Shabeer brings over 23 years of experience in the Information Technology sector, with the past 15 years dedicated to Cybersecurity. He previously led Channel Development and Engagement at Kaspersky Labs, overseeing operations across 25 countries in the GCC, Levant, West Asia, and North Africa. Prior to that, he managed Consumer Partnerships at McAfee, focusing on the Middle East and North Africa and maintaining direct relationships with key players in the telecommunications sector. In addition to his corporate roles, Faizal founded and operated a comprehensive Cybersecurity Solutions and Consulting firm based in Dubai, UAE. He has been actively involved in business networking communities, notably serving as Vice President of BNI(Business Network International), the world's largest business referral organization. Currently serving as a Senior Country Manager, Faizal is responsible for driving strategic business initiatives across 18 countries in the UK and Europe. His role emphasizes channel growth and development, close collaboration with enterprise clients, andadvancing EC-Council's mission to bridge the cybersecurity skills gap by delivering expert consultancy, solutions, and services to combat cyber threats.

Jan Branzell
CEO, Veriscan Security AB

Jan Branzell is CEO of Veriscan Security but also active in ISO/IEC JTC 1 WG 13 Information Technology  Trustworthiness, as well as member of CEN-Cenelec JTC 13 Cyber security and data protection. He has a long experience working with management of information and cyber security and is also international editor of several standards within the ISO 27000 family

Peter Johansson
Regional Sales Manager, Onclik

Sami Petäjäsoja
CEO, SensorFleet Oy

Mr. Sami Petäjäsoja has been working on cyber security since 2006 in various product line owner and executive roles in both startups and large corporations, covering security testing, threat intelligence and most recently security monitoring technologies. In 2011, Sami established Codenomicon operations Singapore and following acquisition of the parent company, relocated to the US to work with Synopsys in Silicon Valley.

Realisation that the network security segment is lagging application centric monitoring platforms lead to the next chapter in his career with relocation back to Finland and co-founding of SensorFleet.

Over his career, Sami has been working on cybersecurity projects for large enterprises, government agencies and defence organisations, authored papers and presented at international conferences.

Peter Csicsay
Sales Director, INALOGY A.S.

With over 16 years of experience in IT and management, Peter Csicsay holds the position of Sales Director. During his career, he has held similar positions at Exclusive Networks, Oracle, IBM, and Dell.

Anne-Marie Eklund Löwinder
Founder & CEO, Amelsec

Anne-Marie Eklund Löwinder is one of Sweden’s leading experts in information and IT security, with approximately 40 years of experience in strategic and operational security work. During her 20 years as CISO at the Internet Foundation, she led the organization through ISO 27000 certification. She now runs her own company, Amelsec. She is a member of the Royal Swedish Academy of Engineering Sciences, Division XII, and serves on the boards of the Swedish Transport Administration, the Swedish Defence Materiel Administration, and the Swedish Tax Agency. She has for many years been a member of the Swedish Civil Contingencies Agency’s Cybersecurity Council and has also served on the government’s AI Commission. Anne-Marie’s work in information and cybersecurity has been recognized with several awards, and she became the first Swede to be inducted into the Internet Hall of Fame.

Matilda Tidlund
Group CISO, Aller A/S

Matilda has over 25 years of professional experience in leadership and change management and over 10 years of Group CSO, CSO/CISO & CISO-roles from different industries, such as Telecommunication, Manufacturing and now Media & Travelling. Within the manufacturing industry Matilda not only build a security organisation from the very start, holding a lot of different roles hands-on herself meanwhile step-by-step recruiting the team but as well guided the team through constructions of manufacturing sites in US, Canada, Germany, Poland, and Sweden, TISAX- certifications and to keep the energy in the team and security in the organisation during Chapter-11-process and bankruptcies. Matilda was a board member for the cybersecurity company "Outpost 24" during 2020 to 2022 and has a board member certificate.

Urmas Aamisepp
Head of Information Security, Epiroc

Urmas Aamisepp Head of Information Security at Epiroc since 2021, Urmas has over two decades of experience in cybersecurity and IT risk management. With a Computer Science background, he has worked in the field since 1997, co-founding High Performance Systems and holding senior roles at DXC. His leadership journey includes serving as CISO at DeLaval and Clas Ohlson, driving enterprise security strategies across global organizations

Ian Wood
Senior Technical Director, Northern Europe, Commvault

During his 25+ years in the software industry, Ian has worked in a variety of roles in data management and security practices, previously at Veritas and Symantec. Ian and his team are engaged with customers to design cyber resilience solutions to solve complex problems for organizations across multiple business sectors. Ian’s interest and experience into cyber and business and disaster recovery provide a unique perspective in defending and recovering organizations and institutions from cyber threats in the 21st century.

2026 Schedule

07:30

Registration & Morning Breakfast

The conference begins with a breakfast for all participants. Arrive early to connect with your peers and meet our partners in the exhibition area.

Read more
08:00

Chairman's Opening Remarks: John Wallhoff, Event Moderator

Event Chairman & Moderator
08:15

Co-Host Partner KeynoteTBA


Read more
08:40

Hands-on post-quantum transition and beyond

Quantum computers have the potential to break widely used public-key cryptosystems, such as RSA and elliptic-curve cryptography, which are a part of our current communication infrastructure. Post-quantum resilience is a field to address these vulnerabilities to ensure the long-term security of our data and communications. We address the practical aspects of transition to post-quantum cryptography covering strategy, inventory, execution, and validation as well as touch upon outstanding challenges of quantum key distribution and what might lie ahead.

Read more
Senior Scientist, RISE
09:05

Building Cyber Resilience Through Collaboration

Director Cyber Defence, SOFF
09:30

IT Security Insights Breakout Sessions

Dive into the morning dynamic breakout sessions with hands-on workshops and live demos. Choose from four exciting parallel tracks, each powered by our supporting partners.



Read more
09:35

From Defensive Security to Cyber Resiliency, Ian Wood Senior Technical Director, Northern Europe

In today's threat landscape, where ransomware has become a $57 billion global crisis, traditional security models are proving insufficient. Organizations are investing heavily in prevention, yet breaches continue to occur - highlighting a critical gap between security plans and recovery readiness. This session explores the fundamental shift from defensive security to cyber resilience, examining why prevention alone isn't enough and how organizations can prepare for - and assume - breach. We'll discuss practical frameworks for building recovery readiness, the critical differences between disaster recovery and cyber recovery, and why testing your ability to restore operations is just as important as preventing attacks in the first place.

Key takeaways

  • Understand the "Assume Breach" Paradigm – Why traditional security investments focus on prevention while recovery readiness remains critically underdeveloped, and how to rebalance your resilience strategy
  • Distinguish Cyber Recovery from Disaster Recovery – Learn the fundamental differences in scope, goals, and methods between operational recovery, disaster recovery, and cyber recovery scenarios
  • Build and Test Your Minimum Viable Company – Identify which critical applications and systems you need to resume operations, and why frequent testing is essential to validate recovery readiness
  • Shift Your Success Metrics – Move beyond traditional RTO/RPO to Mean Time to Clean Recovery (MTCR) and understand why identifying your last clean backup point is critical to cyber resilience.
Read more
Senior Technical Director, Northern Europe, Commvault
09:55

Networking Coffee Break & Visiting The Expo Area

10:15

IT Security Insights 2026 Partner Pitches


Read more

Inalogy IAM - Beyond Licensing Costs: A European Approach to Enterprise Identity Management"

In this session, we explore Inalogy's innovative approach to enterprise IAM using open-source technologies—delivering flexibility, scalability, and cost-effectiveness without compromise

Read more
Sales Director, INALOGY A.S.
10:20

SensorFleet´s Pitch TBA, Sami Petäjäsoja CEO, SensorFleet Oy

CEO, SensorFleet Oy
10:40

Digital Sovereignty, Security and Trustworthiness

  • Is security a part of digital sovereignty?
  • Trustworthiness is building relationships - how does information technology fit into it?
  • Are these three subjects related, and if so, how?


Read more
CEO, Veriscan Security AB
11:05

Implementing Security Frameworks in areas where there are intersecting requirements

Key takeaways:

  • How to build a security team with the correct competence?
  • Aligning requirements


Read more
Head of Business Operations, Ericsson
11:35

Resilience based on the three pillars of Incident Management, Business Continuity and Crisis Management

CISO, Sectra AB
12:00

Networking Lunch & Visiting The Expo Area

13:00

IT Security Insights 2026 Round Table Sessions

We invite you to participate in our distinguished roundtable sessions, providing a platform to voice your perspectives and engage in knowledge exchange with esteemed cybersecurity experts. Discussions will cover a wide range of critical topics shaping the cybersecurity landscape. The format will include two rotations, with delegates transitioning to new tables every 40 minutes to foster broader interaction.

Read more

Cyber Security in a more unpredictable world: Lessons learned from the frontiers

“Many organizations are struggling to adapt to an increasingly unpredictable world. Economic recession and geopolitical instability has made it even more challenging to stay on top of Cyber Security. With Generative AI in the hands of adversaries we now have to rethink our understanding of the cyber threat landscape. 

Key Takeaways:

  • Have your organization been attacked in an increasing rate compared to previously?
  • Are you scaling up your Cyber Security and how is this done while in economic uncertainty?
  • Have the type of controls you implement changed to deal with immediate threats? How do you balance this against your long-term plans?
  • Have the geopolitical instability put new security topics on the agenda? For example Digital Soverignty in Cloud or Disaster Recovery?
Read more
Senior IT Security Architect, Nordea

Building an AI-Enhanced Cybersecurity Workforce: Upskilling for the Future

Session involves information related to the threats involved in our AI space and how do we mitigate AI based threats with enhancement on building AI based cybersecurity skills

Key takeaways:

  • How do you build AI enhanced skills in cybersecurity ?
  • What are the threats evolving under the AI space ?
  • How does the Global AI Cybersecurity market look like ?
  • How does EC-Council help in the AI space ?
Read more
Senior Country Manager – (UK & Europe), EC Council

Training for the Digital Age: Gamification, Behavioral Nudges & AI-driven Awareness

Here we can explore how modern awareness tools like phishing simulations, gamification and behavior-based nudges drive behavioral change, especially against evolving threats like AI-based phishing or deepfakes.

Read more
IAM Specialist, Vattenfall AB

Business Cybersecurity for Agentic AI: Maximizing benefits, minimizing risks

The rise of autonomous AI agents and generative AI presents a significant security paradox for organizations. While these technologies offer immense potential for productivity and efficiency by automating complex tasks and decision-making, they also introduce new and sophisticated security risks.

This roundtable will explore the security challenges and opportunities presented by agentic AI. We'll discuss how to balance the benefits of autonomous operations with the need for strong security protocols, examine potential attack vectors, and address the complex questions around accountability when AI agents make independent decisions. The goal is to provide actionable insights for security leaders and business executives to navigate this evolving landscape and protect their organizations.


Read more
Head of Information & Cyber Security Centre, CSIR

Bridging the gap between top management and technical persons

Let’s be honest — in cybersecurity and tech, this gap is real.

  • C-level leaders think in terms of revenue, market position, shareholder trust.
  • Technical teams think in terms of system stability, vulnerabilities, compliance.

Both are right. But the friction — the miscommunication, the misaligned priorities — can cost companies time, money, and sometimes their reputation.

The session is about calling it out, unpacking it, and — most importantly — figuring out how to fix it.”

Read more
Cybersecurity Executive & CISP Advisor, Vizrt

"How to handle/protect the different information classes in your applications and databases: Public, Internal, Confidential and Restricted

Key takeaways:

  • Automatically class your information based on rules or not
  • Have different applications/databases/locations for Confidential and Restricted"
  • Have all information in same application but with instructions how to handle the different classes
Read more
IT Security Architect, Aktiebolaget Svensk Exportkredit(SEK)

Implementing Security Frameworks in areas where there are intersecting requirements

Head of Business Operations, Ericsson

Dimitrios Stergiou, CISO Taptap Send - Table Session TBA

CISO, Taptap Send

Peter Johansson´s Round Table Session TBA

Regional Sales Manager, Onclik
14:20

Afternoon Coffee Break & Visiting the Expo Area

15:00

Keynote TBA


Read more
15:25

“ Legislation’s impact on information security – or is it information security’s impact on legislation? A brief overview of how the legislative requirements have changed over time.”

Helena’s keynote will provide a high-level overview of how cybersecurity and information security legislation has evolved over time. The session will trace the journey from early legislation that largely referred to “best practice” — without clearly defining specific requirements or implementation methods — to today’s increasingly detailed and prescriptive regulatory frameworks such as DORA and NIS2.

Key takeaways:

  • The keynote will explore how best practices have historically shaped legislation, gradually becoming formalised into binding legal requirements. This evolution will be illustrated through examples ranging from early regulatory principles dating back to the 1350s, through Swedish legislation such as Personuppgiftslagen, MSB’s recommendations for the public sector, Lagen om elektronisk kommunikation and PTS regulations, to more recent frameworks including NIS1, DORA, and NIS2.
  • The session will conclude with reflections and forward-looking considerations on future regulatory developments, including potential implications of initiatives such as the Digital Omnibus, and how organisations can prepare for what comes next.
Read more
Senior Cybersecurity Governance & Assurance Specialist, Skanska AB
15:45

Afternoon Break & Visiting the Expo Area

15:55

Closing Keynote TBA

16:20

Panel Discussion: Cyber Resilience 2030 – What Will Define Success in the Next Decade?

Synopsis: 

We are approaching a transition from a stage with legal & regulatory requirements in focus into the world of quantum, AI and the unknown. This panel will discuss how these changes will reshape our profession, organisations, ways of working and the technology.

Read more
Event Chairman & Moderator
Founder & CEO, Amelsec
Group CISO, Aller A/S
Head of Information Security, Epiroc
17:00

Chairman's Closing Remarks

17:10

Closing Networking Reception Starts

Editorial

A Decade of Shaping Sweden’s Cybersecurity Future

For the past ten years, the IT Security Insights Conference has been more than just an event — it has been a meeting ground for the brightest minds and strongest voices in Sweden’s cybersecurity landscape. As we step into our 10th Edition, we reflect on a decade of progress while looking ahead to the pressing challenges that will define the next era of digital security.

Cybersecurity today is not just a technical issue; it is a strategic imperative that affects every layer of an organisation. Medium to large enterprises in Sweden and across the globe are navigating an increasingly complex environment — balancing innovation, regulation, and resilience against a backdrop of ever-evolving threats. This year’s programme is designed to equip leaders with clarity and direction, combining visionary keynotes, real-world case studies, interactive panels, and sector-focused workshops.

But what truly defines IT Security Insights is its community. Over the years, we’ve seen leaders — CISOs, CIOs, CTOs, heads of IT, and compliance experts — come together not just to share knowledge, but to build partnerships that last beyond the conference walls. It is this spirit of collaboration that transforms discussions into action and ideas into innovation.

As we celebrate this milestone edition, our mission remains unchanged: to inspire, connect, and empower the professionals shaping the future of cybersecurity. We invite you to join us, not only to mark a decade of achievement, but to be part of the conversations that will drive the next decade of resilience and growth.

Registration is now open — and so is the next chapter of Sweden’s cybersecurity story.

We are looking forward to seeing you on the 4th of March, 2025 at Hotel Birger Jarl!

Sincerely,

Robert Kitunzi

Event Project Manager

    Hotel Birger Jarl

    Hotel Birger Jarl is probably Stockholm city’s most personal business and conference hotel. Step into the welcoming lobby and be greeted with timeless Scandinavian design that is colourful, light, open, and airy. The hotel offers modern conference facilities for up to 550 persons, featuring plenty of rooms for inspiring meetings as well as pleasant relaxation. Staying at the hotel guarantees you a warm welcome with personal care, comfortable beds, and delicious meals. Hotel Birger Jarl is named after the founder of Stockholm, and our feet are firmly planted in our national heritage. When you visit the hotel, you will notice at once that there is combination of these traditions with innovative thinking and considerate service, as well as the best that contemporary design has to offer. This central hotel showcases 271 rooms and among them you find a unique design of rooms decorated by well-known Swedish interior architects and designers.

    Address: Birger Jarlsgatan 61A, 113 56 Stockholm, Sweden.

    Venue website: http://www.birgerjarl.se/en/in...


    Organized by