We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Nordic Cyber Summit

Search

Clear Expand Collapse

How NIS2 Reshapes Detection & Response Strategy

Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.

Price
Course duration Duration: 30 minutes

Preparing Our Industries for Further AI Regulations

Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.

Price
Course duration Duration: 30 minutes

How to Prepare for & Recover From Cyberattacks

Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.

Price
Course duration Duration: 25 minutes

Maintaining Operations During Cyberattacks

Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.

Course duration Duration: 25 minutes

The Behavior Gap: Why Security Awareness Isn't Enough

Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.

Course duration Duration: 10 minutes

Fraud Prevention & Risk Management for Digital Identity

Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.

Price
Course duration Duration: 25 minutes

Securing Against Deepfakes, Agentic AI, & Quantum

Tony Fergusson of Zscaler examines why zero trust must evolve to verify data authenticity in deepfake era and how adversaries exploit trusted platforms and use prompt injection to evade AI detection.

Course duration Duration: 30 minutes

How Do We Leverage the Human Factor to Mitigate Cyber Risk?

Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.

Price
Course duration Duration: 1 hour

Pen-Testing Insights

Anders Björklund of Martin & Servera demonstrates converting penetration test findings into quantified business risk using NIST CSF 2.0 frameworks.

Course duration Duration: 20 minutes

Building a Team Capable of Overseeing IT & OT Security

Malonie Guha of SKF Group explores building security teams capable of managing IT/OT convergence by respecting operational boundaries and balancing technical expertise.

Price
Course duration Duration: 25 minutes

Geopolitical Risk & Third-Party Security

Daniel Norman of Information Security Forum moderates discussion with Sune Aggergaard Mortensen of DCAI and Rune Ören Skarphagen of Play'n GO on managing hyperscaler dependencies amid geopolitical fragmentation.

Price
Course duration Duration: 20 minutes

Strengthening Data Protection with Governance

Vida Ahmadi of Electrolux Group shares lessons from transforming data governance from compliance overhead into business enabler through value-focused implementation.

Price
Course duration Duration: 30 minutes

Safeguarding Healthcare in the Cyber Age

Torkel Thune of Oslo University Hospital examines converging cyber and physical threats to healthcare, emphasizing resilience over technical controls as hospitals prepare for nation-state attacks and potential conflict.

Price
Course duration Duration: 30 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement