Assume Breach. Shield your Core

GET TICKETS →
23/09/2026
10:00-16:30
Helsinki

Event Agenda

Theme 1

The Threat Landscape and Strategic Leadership

10:00

Opening Remarks: How to Prepare and Respond to an AI-Driven Threat Landscape in 2026
  • AI is now the #1 data exfiltration channel
  • The data explosion is fuelling new attack surfaces
  • Identity has become the new geopolitical weapon

10:25

Defending Finland in the Digital Era
  • Facing Modern Threats - Cyberattacks, drones, and information warfare
  • Innovation Meets Defense - Civilian technology solving military challenges
  • Building Resilience - AI, energy, and secure networks for a safer society

10:45

Threats at Scale: Global Cybercrime Through a Unique Internet Lens
  • Uncovering real-time patterns in DDoS campaigns, bot activity, and AI-driven attacks
  • Revealing how automation fuels massive, targeted assaults on critical infrastructure and digital commerce
  • Exposing escalating supply chain risks and the evolving tactics of cyber adversaries

11:00

Cybersecurity Leadership: What security leaders must rethink in 2026 and beyond
  • The new blind spots: Emerging threats that won't appear in risk reports - but will hit your bottom line
  • Security as a business issue: Why success hinges on people, process, and cross-functional alignment
  • Compliance doesn’t equal resilience: Building a resilient strategy that adapts to evolving threats and activates the whole organization

11:20

Regulatory Compliance & Legal Strategies: Strengthening Cyber Resilience in the Age of AI and Evolving EU Standards
  • Navigate the intersection of AI governance and cybersecurity risk, with a focus on the EU AI Act, NIS2, and ISO 27001
  • Leverage DORA TLPT in alignment with TIBER-EU and CBEST to proactively test and strengthen your organization’s cyber risk posture
  • Streamline legal, regulatory, and technical frameworks to meet evolving obligations and build long-term cyber resilience

11:40

Hybrid Operations in the Cyber Domain
  • Cyber operations, delusive information mixing the traditional boundaries by purpose
  • Cybersecurity and cyber defense are equally important in securing critical infrastructure. Private sector and public sector cannot be separated
  • What is your company role in the larger perspective? How cyber resilient are you?

Lunch

12:00-13:00
Theme 2

Building NextGen Security: Preparing for the Inevitable Attack

13:00

Minimum Viable Company: Restoring What Matters Most, First
  • Reduce Mean Time to Recovery (MTTR) across data, cloud apps, and core systems
  • Lead with clarity under pressure: decision-making strategies during active breaches
  • Plan for resilience across pre-incident, active response, and post-recovery phases

13:15

Combatting Complex Cybercrime – The Police Perspective
  • From Encryption to Data Theft – Understanding the Evolving Threat Landscape
  • National and International Cooperation – Building Stronger Law Enforcement Partnerships
  • The Future of Cyber Threats – Emerging Risks and Strategic Challenges

13:30

DDoS & Credential Stuffing: Cheap Attacks, Big Risk
  • Understanding why common low-cost attacks cause high-cost business disruption
  • Protecting applications from downtime, account takeovers, and data loss
  • Building proactive, scalable defenses to stay ahead of evolving threats

13:45

Digital Transformation of Cybersecurity
  • Security operations are rapidly evolving to keep up with the threat landscape, Unlock the potential of new and emerging technologies Digital Risk Management tools including automation, advanced analytics, AI & ML
  • Prevent AI & other technology assets from derailing organisational security, and leave you vulnerable and with blind spots
  • Digital transformations is reforming the cyber security: How AI & ML is used to Threat Detection & Response

14:00

The Innovation Imperative: Outpacing AI-Driven Adversaries
  • How attackers use AI to accelerate, disguise, and scale modern intrusions
  • Why identity is now the primary battleground in cybersecurity
  • The case for cross-domain visibility across endpoint, identity, and cloud

14:15

Take Control in a World of Uncertainty. Adaptive Threat Defense
  • A cyber storm is gathering – what are the major factors that increase risk?
  • With increased risk comes increased expectations – what are the most important objectives and control drivers?
  • How can you build an efficient cyber strategy that results in better outcomes?

Networking Break

13:50-15:00
Theme 3

AI Integration, Business Security Culture & Human Centric Strategies

15:00

Case: Human Risk Management: From Awareness to Accountability
  • Making accountability a leadership priority at every level of the organisation
  • Equipping employees to recognise and respond to real-world cyber threats
  • Embedding secure behaviours into everyday workflows through cross-team collaboration

15:15

AI Shaping the Role of Future Cybersecurity Strategies
  • How next-gen AI can be leveraged to predict, prevent and respond to emerging threats
  • AI in Cybersecurity: Opportunities, Privacy Concerns and Ethical Considerations
  • Practical strategies for integrating advanced AI technologies into existing frameworks

15:30

Executive Risk Meets Cyber Reality: What Boards Need to Know (and Ask)
  • Making cyber risks visible and actionable for executive stakeholders
  • Aligning strategy and compliance while closing real-world security gaps
  • Enabling board-level engagement through clear metrics and accountability
  • What emerging threats organisations are probably not thinking about but should

15:45

Security Culture: The Hidden Engine of Cyber Resilience
  • Prevention beats reaction - build awareness to reduce incident risk
  • Align with NIS2 & DORA to strengthen compliance and operational readiness
  • Combine proactive culture with SOC capabilities for faster, smarter incident response

16:15

Creating a Strong Business Security Culture
  • People Centric Strategies for 2026. Building a Culture of Awareness and Responsibility
  • Recognizing and Mitigating Insider Risks: Addressing Vulnerabilities from Within
  • The Importance of Modern and Resilient Cyber Leaders

End Of Day

16:30