CIO Nordics Summit | March 28, 2023 | Copenhagen, Denmark


Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Opening Keynote Panel: Embracing Change: Creating A Flourishing Diverse Culture

9:15 AM - 10:00 AM

Achieving a diverse thriving culture within your organisation is not always easy.

In this session, our expert panellists will identify and share the natural tendencies that may occur when working to foster a diverse culture, the different kinds of bias present in our society and why it matters, and how to leverage this awareness for success.

Thomas Zuliani

Information Security & Data Privacy Director


Julie Siezing

Director, Data Management Office

GN Group

Riska Mirzalina

Transformation Lead, Digital Transformation Office


Sarbajit Deb

Executive Vice President, Europe

Larsen & Toubro Group

Holger Cornelius Kirketerp

Head of Cloud Center of Excellence


Innovation Partner: Federated Computational Data Governance (A Customer Use Case)

10:05 AM - 10:15 AM
While decentralizing data ownership enables autonomy, boosted by self-service infrastructure and an enabling platform, it opens up to the risk of (re)creating silos. Traditional centralized data governance can't keep up with the scale of complex enterprises, this is why the need for a federated approach with solid foundations on automation is key for success. In this talk, Roberto will present a retrospective on the approach adopted in a real customer scenario, an innovative multiservice and platform company, to set up a practice for this mission critical pillar of the Data Mesh paradigm.

Roberto Coluccio

Staff Data Architect

Agile Lab

AM Executive Networking Break

10:20 AM - 10:40 AM

Knowledge Exchange: Roundtable Discussion - How To Connect Business Continuity To Resilience

10:45 AM - 11:15 AM

During this roundtable, we will discuss how businesses can use business continuity to improve their resilience and lower the impact of critical incidents.

Moderator: Johan Hjelm, will share insights on how they've used business continuity to identify, communicate and mitigate risks within their own organisations.

Johan Hjelm

Group of Operational Risk Deputy Head


Knowledge Exchange: Roundtable Discussion - Digital Transformation - Building A New Business Model

10:45 AM - 11:15 AM

Digital transformation is already well underway, disrupting traditional business models that were not entirely digital-ready.

Yet, there are still many organizations that are looking for ways to improve their new business models and leverage technology to scale at speed.

Moderator: Saransh Kapur will share how to leverage technology to reimagine what your brand can be today and going forward.

Saransh Kapur

Engineering Director, Agile Product Leadership & Transformation

A.P. Moller Maersk

Knowledge Exchange: Roundtable Discussion - How To Enable Trust In Your Digital Agreements...

10:45 AM - 11:15 AM

How To Enable Trust In Your Digital Agreements And Digital Transactions.

Enterprises everywhere are being challenged to adapt their foundational revenue-generating, customer-facing business processes.

With the world transitioning to Web 3.0, OneSpan focusses on automating and securing those business processes, to enable the potential of tomorrow to be secure.

During the Intimate Discussion Group, we will discuss how organizations can solve online challenges for both employees and consumers through completely automated and secure business processes.

 Attend the Intimate Discussion Group and get insights from OneSpan Field CTO Dan McLoughlin on

  • How identify verification and authentication solutions can enable      trusted interactions with your customers
  • How secure interaction solutions are enabling enterprise clients to      view and complete agreements, while maintaining a human connection
  • How to balance security and user experience for your customers & employees

Dan McLoughlin



Executive Boardroom: Never Login Again: The Path to Passwordless Is Paved with Orchestration

11:20 AM - 11:45 AM
Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate passwordless journeys for your workforce and customers using contextual factors, such as user location, behavior, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorized access.

Matthew Berzinski

Senior Director of Product Management

Forge Rock

Panel Discussion: How To Retain Top Talent In Your Organisation

11:50 AM - 12:20 PM

How To Retain Top Talent In Your Organisation

Retaining top talent is a critical challenge for organisations that aim to thrive in a highly competitive marketplace. Losing key employees can have a significant impact on the organization's productivity, profitability, and reputation. In this session, we will discuss effective strategies for retaining top talent in your organization. 

The session will explore the current trends and challenges related to employee retention and provide insights into the factors that influence employee turnover. The panel will cover various aspects of employee retention, including creating a positive workplace culture, offering competitive compensation and benefits, providing opportunities for growth and development, and implementing effective performance management and recognition programs.

Participants will gain a deeper understanding of the importance of retaining top talent, the challenges associated with it, and the strategies and tactics that can help organizations build a high performing, engaged workforce. By the end of this session, participants will be equipped with practical tools and knowledge to develop effective employee retention strategies for their organizations.

Henrik Løth Thiesen

VP, Cyber Risk Quantification & Strategy Enablement, Enterprise Cyber Security

Vestas Wind Systems

Saransh Kapur

Engineering Director, Agile Product Leadership & Transformation

A.P. Moller Maersk

Anders Blauenfeldt

SVP, Technology North


Innovation Partner: Zero Trust Security - Enabling Scalable, Dynamic Security Across Clouds

12:25 PM - 12:35 PM

In this era of increased threat, security experts have turned to a Zero-Trust security framework, prioritising validation over the implicit trust.

The challenge comes when transforming. Rethinking your enterprise infrastructure can present challenges far beyond the inside of your organisation.

During this session, we’ll discuss how Zero Trust can liberate your organisation to thrive in the remote working era and enable transformation.

Key Takeaways:

  • Improve your overall security posture and reduce the likelihood of a breach
  • Increase productivity and reduce costs with a fully managed infrastructure
  • Securely accelerate cloud adoption

Sarah Polan



Innovation Partner: Digital Transformation Is Built On A Foundation Of APIs ...

12:40 PM - 12:50 PM

Digital Transformation Is Built On A Foundation Of APIs - But Are Your APIs Secure?

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing everyday as the scale and reach of API attacks increases. The time to act is now. This talk explains how a continuous approach to protecting your APIs from design to runtime can be achieved. In this talk you will learn how Global 2500 enterprises are embracing a positive security model to ensure their APIs adhere to corporate governance and compliance policies

Axel Grosse

API Security Advisor


Executive Networking Lunch

12:50 PM - 1:50 PM

Executive Boardroom: Managing Your Exposure In The Age Of Digital Transformation

1:50 PM - 2:15 PM

The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management Programs Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. This not only makes threat management more challenging,  but can also dramatically increase our exposure to attack.

So how can we do a better job of proactively understanding and reducing the risks and exposures associated with this disparate environment, while simultaneously significantly reducing the stress on our threat management systems and teams?

Sanara Marsh

Director of Product Marketing


Think Tank: Leadership - How To Get The Best Out Of Your Global Teams

2:20 PM - 2:45 PM

Muthukumar Thandavarayan


Danske Bank

Think Tank: How To Be On The Right Side Of Critical Infrastructure

2:20 PM - 2:45 PM

Critical infrastructure is built and operated according to cyber-security standards.

Cyber-security standards include policies, procedures, architectures and other mechanisms to ensure that their information systems are up to date. Infrastructures such as energy plants, water treatment plants and other essential public service providers must meet these high standards of security if they are not to be compromised by malicious actors through cyber-attacks - such as denial of service attacks or sabotage.

Hanne Hansen



Think Tank: How The World Of IT Looks At Sustainability

2:50 PM - 3:15 PM

As an IT Leader, you are facing a new wave of challenges with the growing awareness of the importance of sustainability.

Corporate executives and the board are looking to IT departments to provide reliable services while also meeting company goals in reducing energy costs and greening their environment. Key takeaways include:

  • Sustainability Business Risks
  • IT Specific Sustainability Risks
  • IT Sustainability Challenges

Erik Haahr

Chief Enterprise Architect


Think Tank: How To Work With Executives To Drive Your Strategic Cyber Security

2:50 PM - 3:15 PM

The situation is a threat landscape that continues to worsen.

Security professionals are doing what is feasible to enable sufficient security safeguards. But the situation many organizations are facing remains with a limited security budget.

Security is not a layman's language. Executives may struggle to understand the security persons' messages well enough to be able to decide if the security risk is more important than other present risks. I have for many years worked with several boards of Directors and Executives, and my experience tells me that it is not that complicated, if security becomes considered a business risk.

 Key takeaways:

  • How security has been measured using financial impacts
  • How a strategic threat outlook can help you to quantify the likelihood of cyber risks
  • How to get buy-in from Executives as you still are assessing the cyber risks

Henrik Løth Thiesen

VP, Cyber Risk Quantification & Strategy Enablement, Enterprise Cyber Security

Vestas Wind Systems

Think Tank: How To Embed Third Party Risk Management In Your Organisation

3:20 PM - 3:45 PM

How To Embed Third Party Risk Management In Your Organisation

Many organizations increasingly rely on third-party vendors to support critical operational activities as they continue their digital transformation, requiring them to manage and monitor third-party vendor cyber risk exposures to ensure business continuity and mitigate the risk of data breaches and cyber-attacks involving third and even fourth-party vendors. Eve will share Saxo's journey towards building a vendor risk management program to manage cyber risk exposures, lessons learned, good practices and upcoming challenges.

Evgenia Christensen

Deputy CISO

Saxo Bank

Think Tank: How To Accelerate Your Digitalisation - A Sweco Case Study

3:20 PM - 3:45 PM

The starting point for any successful digitisation transformation is a thorough understanding of your business goals and whether or not they can be achieved through digital channels.

Digitisation has the power to create value in your business by reducing costs, increasing efficiency and providing additional revenue streams.

During the last 3 years, Sweco has managed to substantially accelerate digitalisation. In this session you will learn how this was done, what actually does work, overall and with focus on AI and Automation in the AEC industry; and have a thorough overview of the framework they used that will help you develop a clear direction for your own digitisation journey.

David Hunter

Head of AI & Automation


Pär Wahlander

Head of Digital and Development


PM Executive Networking Break

3:45 PM - 4:05 PM

Fireside Chat: How Do You Advertise Risk As A Tool Within Your IT & Security Function

4:10 PM - 4:35 PM

Sebastian Mabillon

Chief Security Officer/Vice President


Knowledge Exchange: Roundtable Discussion - Handling Vulnerability Management Challenges

4:40 PM - 5:05 PM

One of the biggest challenges for organisations today with vulnerability management is organisations are using disparate tools to try and manage their risk.

This makes it difficult for different teams to work together and share information, which makes understanding vulnerabilities and their impact across the enterprise difficult.

Moderator: Konrad Hall, will share how vulnerability management can be simplified through the concept of a centralised repository where all security information resides and is shared across lines of business.

Konrad Hall

Executive Director - IT Platforms


Knowledge Exchange: Roundtable Discussion - Looking Into Data Management

4:40 PM - 5:05 PM

Data is at the heart of every decision.

With it, we can make smarter decisions, uncover new insights and drive better outcomes.

Moderator: Anders BlauenfeldtIn, will dive deep into ways you can maximize your data management.

Anders Blauenfeldt

SVP, Technology North


Knowledge Exchange: Roundtable Discussion - How Not To Fail At Your Zero Trust Initiatives

4:40 PM - 5:10 PM

What are the real-life challenges you need to solve, when implementing the Zero Trust Architecture?

Zero Trust, the concept of “assume breach, never trust, always verify,” has progressed beyond hype to practical implementation. Today, it is viewed as a strategic cybersecurity initiative that organizations must embrace if they are to prevent cyberattacks and remain profitable and productive. 

While it is important for organizations to implement the Zero Trust Architecture, it does come with its set of challenges. Join this session where we discuss the various zero trust implementation challenges and the best practices to be followed to ensure a successful Zero Trust implementation. 

You will learn:

  • The need for a standardised Zero Trust Architecture framework
  • What are the real-life challenges you need to solve, when implementing the Zero Trust Architecture?
  • Best Practices in Zero Trust Architecture Implementation

Ulrich Rysgaard

Sr. Strategic Security Advisor


Closing Panel: A Cyber Catastrophe Has Happened - Now What’s Next?

5:10 PM - 5:40 PM

The recent cyber catastrophe is the latest reminder of the need to be better prepared for the dangers of a digital world.

Fortunately, there are many resources available to help inform organisations about best practices and keep their employees safe.

We’ll hear from the experts who will discuss how leaders in business and government can work together more closely to protect national security while avoiding a digital arms race.

Jörgen Mellberg



Höskuldur Hlynsson

Chief Risk Officer / CISO

Central Bank of Iceland

Fredrik Hult


Banco Santander - Pagonxt

Closing Remarks

5:40 PM - 5:45 PM

Casino & Cocktails Executive Drinks Reception

5:45 PM - 7:00 PM

Expect an evening full of fun and excitement.

With casino tables set up throughout the venue, you can try your luck at popular games like poker, blackjack, and roulette.

Whether you're a seasoned pro or a beginner, our friendly and experienced dealers will be on hand to guide you through the games and ensure you have a great time.

In addition to the casino games, you'll also be able to enjoy a range of expertly crafted cocktails and other drinks, each one designed to tantalise your taste buds and keep you in good spirits. As you sip on your drink of choice, you'll have the opportunity to engage in conversations with other CIOs and CISOs from across the Nordics, sharing ideas, best practices, and insights that can help you drive your business forward.

Overall, the Casino and Cocktails Executive Drinks Reception promises to be an evening of laughter, good cheer, and unforgettable memories!