Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Tony Fergusson of Zscaler examines why zero trust must evolve to verify data authenticity in deepfake era and how adversaries exploit trusted platforms and use prompt injection to evade AI detection.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Anders Björklund of Martin & Servera demonstrates converting penetration test findings into quantified business risk using NIST CSF 2.0 frameworks.
Malonie Guha of SKF Group explores building security teams capable of managing IT/OT convergence by respecting operational boundaries and balancing technical expertise.
Daniel Norman of Information Security Forum moderates discussion with Sune Aggergaard Mortensen of DCAI and Rune Ören Skarphagen of Play'n GO on managing hyperscaler dependencies amid geopolitical fragmentation.
Vida Ahmadi of Electrolux Group shares lessons from transforming data governance from compliance overhead into business enabler through value-focused implementation.
Torkel Thune of Oslo University Hospital examines converging cyber and physical threats to healthcare, emphasizing resilience over technical controls as hospitals prepare for nation-state attacks and potential conflict.