{"id":81,"date":"2022-02-01T12:11:33","date_gmt":"2022-02-01T11:11:33","guid":{"rendered":"https:\/\/insightevents.se\/cybersakerhet\/?page_id=81"},"modified":"2024-07-04T11:02:22","modified_gmt":"2024-07-04T09:02:22","slug":"program","status":"publish","type":"page","link":"https:\/\/insightevents.se\/cybersakerhet\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section][vc_row disable_element=&#8221;yes&#8221;][vc_column]<div class=\"wpb_content_element \"><style type=\"text\/css\">#ut_header_69de2ebc9eaa7 h1.section-title { font-size:40px !important; }<\/style><header id=\"ut_header_69de2ebc9eaa7\" class=\"section-header  ut-no-title-linebreak-mobile ut-no-lead-linebreak-mobile pt-style-2 header-center header-tablet-center header-mobile-center\"><h1 data-title=\"PROGRAM CYBERS\u00c4KERHET INOM DEN FINANSIELLA SEKTORN\"  data-responsive-font=\"section_title\" data-responsive-font-settings=\"{&quot;base-font-size&quot;:&quot;40&quot;,&quot;font-size-unit&quot;:&quot;px&quot;,&quot;font-size&quot;:{&quot;desktop_large&quot;:&quot;40&quot;},&quot;base-line-height&quot;:&quot;global&quot;,&quot;base-letter-spacing&quot;:&quot;global&quot;}\" class=\"section-title  \"><span>PROGRAM CYBERS\u00c4KERHET INOM DEN FINANSIELLA SEKTORN<\/span><\/h1><\/header><\/div><style type=\"text\/css\"><\/style><div id=\"bklyn_btn_69de2ebca1178\" class=\"bklyn-btn-holder  bklyn-btn-center bklyn-btn-tablet-center bklyn-btn-mobile-center\"><a title=\"\"   href=\"https:\/\/insightevents.se\/cybersakerhet\/broschyr\/\" target=\"_self\" class=\"bklyn-btn  bklyn-btn-normal\" ><span class=\"ut-btn-text\">H\u00c4MTA BROSCHYREN<\/span><\/a><\/div>[vc_column_text]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #6d3a6d;\">PROGRAM 15 NOVEMBER 2023 I STOCKHOLM<\/span><\/h2>\n<p>\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><strong>08:30<\/strong><\/td><td class=\"column-2\"><strong>Registrering och morgonkaffe<\/strong><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>09:00<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn inleder konferensen<\/strong><br \/>\n<br \/>\n<i><strong>Ulrik Franke, <\/strong>Senior forskare, RISE Research Institutes of Sweden och adjungerad professor vid Kungliga Tekniska H\u00f6gskolan (KTH)<\/i><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>09:10<\/strong><\/td><td class=\"column-2\"><strong>Going from awareness to accountability among all employees<\/strong><br \/>\n<br \/>\nThe \u201cpeople\u201d factor is often ignored, yet it is a critical element in building a strong defence. But how do you create a sustainable security culture which is not built in a day? How do employees play an important role in<br \/>\nresilience to increased cyber threats.<br \/>\n<br \/>\n\u2022 Security starts from the top<br \/>\n\u2022 Credit Risk, Financial Risk, Cyber Risk and now \u2013 Human Risk<br \/>\n\u2022 One step ahead \u2013 of security threats<br \/>\n\u2022 Security everyone's business<br \/>\n<br \/>\n<i><strong>Helena Malm,<\/strong> Head of CISO Office, Swedbank<br \/>\n<strong>Jannica Passad,<\/strong> Information Security Officer, Swedbank<\/i><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>09:50<\/strong><\/td><td class=\"column-2\"><strong>DORA i praktiken \u2013 Identifiering av kritiska eller viktiga funktioner hos Norion Bank<\/strong><br \/>\n<br \/>\n\u2022 Hur kan god k\u00e4nnedom om verksamhetens processer och funktioner f\u00f6rb\u00e4ttra s\u00e4kerheten?<br \/>\n\u2022 Hur har Norion Bank i sitt arbete med DORA i praktiken identifierat bankens kritiska eller viktiga funktioner<br \/>\n\u2022 Hur m\u00f6jligg\u00f6r detta en tydligare s\u00e4kerhetskravst\u00e4llning p\u00e5 Bankens IKT-tj\u00e4nster och \u00f6kad robusthet<br \/>\n<br \/>\n<i><strong>Christoffer Umeland, <\/strong>Chief Security Officer (CSO), Norion Bank Group<\/i><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>10:30<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rmiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><strong>11:00<\/strong><\/td><td class=\"column-2\"><strong>Insikter fr\u00e5n n\u00e5gra Doraprojekt<\/strong><br \/>\n<br \/>\n\u2022 Erfarenheter fr\u00e5n ett antal Doraprojekt<br \/>\n\u2022 Vad \u00e4r en ikt-tj\u00e4nst och inte?<br \/>\n\u2022 Hur ska man angripa testprogrammet?<br \/>\n<br \/>\n<i><strong>Stefan Funck Pettersson, <\/strong>consultant &amp; partner, Springflod <\/i><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><strong>11:30<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rst\u00e4rkt digital motst\u00e5ndskraft hos f\u00f6retag i den finansiella sektorn<\/strong><br \/>\n<br \/>\n\u2022 Vilka risker ser FI kopplat till den digitala utvecklingen inom finansiell sektor? <br \/>\n\u2022 Vilken roll har FI?<br \/>\n\u2022 Hur kan den digitala motst\u00e5ndskraften hos f\u00f6retagen i den finansiella sektorn st\u00e4rkas?<br \/>\n<br \/>\n<i><strong>Linda L\u00f6fgren,<\/strong> avdelningschef Motst\u00e5ndskraft och beredskap, Finansinspektionen<\/i><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><strong>12:00<\/strong><\/td><td class=\"column-2\"><strong>Lunch med n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><strong>13:10<\/strong><\/td><td class=\"column-2\"><strong>PANELDISKUSSION<br \/>\nCyberhoten i v\u00e4rlden \u00f6kar och riktar sig allt oftare mot samh\u00e4llsviktiga funktioner som finanssektorn \u2013 hur m\u00f6ter vi hoten p\u00e5 b\u00e4sta s\u00e4tt?<\/strong><br \/>\n<br \/>\n<br \/>\nPanelen leds av <i><strong>Ulrik Franke,<\/strong> Senior forskare, RISE Research Institutes of Sweden och adjungerad professor vid Kungliga Tekniska H\u00f6gskolan (KTH)<\/i><br \/>\n<br \/>\nPaneldeltagare:<br \/>\n<i><strong>Magnus Jacobson,<\/strong> Senior Adviser Cyber Security, Svenska Bankf\u00f6reningen<br \/>\n<strong>Kevin Aytap,<\/strong> Independant Advisor och fd. CISO Avanza, Riksbanken och SEB <br \/>\n<strong>Rose-Mharie \u00c5hlfeldt,<\/strong> Professor in Informatics, Ph D, School of Informatics, University of Sk\u00f6vde<br \/>\n<br \/>\nPaneldeltagare uppdateras l\u00f6pande<\/i><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><strong>13:40<\/strong><\/td><td class=\"column-2\"><strong>AI in a Bank \u2013 the Good and the Ugly<\/strong><br \/>\n<br \/>\nAs artificial intelligence continues to transform the banking industry, it's essential to understand both the tremendous benefits it brings and the potential risks and challenges it poses. AI plays a crucial role in protecting customer data and assets, leveraging its capabilities to enhance security and operational efficiency. Let's delve into the good and the ugly sides of AI in banking. <br \/>\n<br \/>\nThe Good Enhanced Security and Protection of Customer Data:<br \/>\n\u2022 AI-driven systems use advanced encryption techniques and real-time monitoring to safeguard customer data from breaches and unauthorized access.<br \/>\n\u2022 Machine learning models predict and mitigate potential security threats, ensuring the integrity and confidentiality of sensitive information. <br \/>\n<br \/>\nPredictive Analytics for Proactive Services:<br \/>\n\u2022 AI-powered predictive analytics forecast market trends and customer behaviors, enabling banks to offer proactive financial products and services.<br \/>\n\u2022 AI algorithms analyze vast amounts of data to predict credit risks and tailor loan offerings, improving lending accuracy and customer satisfaction.<br \/>\n<br \/>\nThe Ugly Security and Privacy Concerns:<br \/>\n\u2022 AI systems can be targeted by sophisticated cyber-attacks, potentially compromising sensitive customer data.<br \/>\n\u2022 The use of AI in data processing raises significant privacy issues, requiring stringent regulatory compliance.<br \/>\n<br \/>\nBias and Ethical Issues:<br \/>\n\u2022 AI algorithms can inadvertently perpetuate biases present in the training data, leading to unfair treatment of customers.<br \/>\n\u2022 The lack of transparency in AI decision-making processes can result in ethical dilemmas and mistrust among customers.<br \/>\n<br \/>\n<i><strong>Ulf Larsson,<\/strong>Group Security CTO, SEB<\/i><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><strong>14:10<\/strong><\/td><td class=\"column-2\"><strong>Kvantifierad hotanalys och viktning av risker - identifiera, kvantifiera och prioritera risker f\u00f6r att effektivt skydda organisationens tillg\u00e5ngar och intressen<\/strong><br \/>\n\t<br \/>\n\u2022 S\u00e5 kan du hantera risker och rangordna dem p\u00e5 ett s\u00e4tt som m\u00f6jligg\u00f6r b\u00e4ttre beslutsfattande och resursallokering i dagens komplexa s\u00e4kerhetslandskap<br \/>\n\u2022 Introduktion av en kvantitativ metod f\u00f6r att analysera hot och s\u00e4tta vikter p\u00e5 risker baserat p\u00e5 en strukturerad bed\u00f6mning av hot-scenarier<br \/>\n\u2022 Utifr\u00e5n FAIR-ramverket (Factor Analysis of Information Risk) kommer vi att utforska hur faktorerna nedan kan kombineras f\u00f6r att ber\u00e4kna riskvikter:<br \/>\n-\tHotfrekvens<br \/>\n-\tF\u00f6rlustfaktorer<br \/>\n-\tOrganisationens skyddsstyrka<br \/>\n<br \/>\n<i><strong>Johan Svenfelt,<\/strong> Senior Manager - Cyber Security, advisense<\/i><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><strong>14:40<\/strong><\/td><td class=\"column-2\"><strong>Eftermiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><strong>15:10<\/strong><\/td><td class=\"column-2\"><strong>Att komma tillbaka efter en hackerattack \u2013 en digitaliseringsresa<\/strong><br \/>\n<br \/>\n\u2022 Vilka konsekvenser f\u00e5r en attack \u2013 vad gjorde vi och vilka fr\u00e5gest\u00e4llningar fick vi hantera?<br \/>\n\u2022 Att strukturera och skapa rutiner f\u00f6r att minimera risken f\u00f6r kommande ransomware-attacker?<br \/>\n\u2022 Krishantering om det v\u00e4rsta sker och vikten av att agera i tid men ocks\u00e5 med r\u00e4tt \u00e5tg\u00e4rder<br \/>\n\u2022 Att f\u00e5 med sig ledningsgruppen och f\u00f6rst\u00e5 allvaret i situationen<br \/>\n<br \/>\n<i><strong>Anna Stewart, <\/strong>Information Technology Infrastructure Operations Manager, Bakels Sweden<\/i><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><strong>15:40<\/strong><\/td><td class=\"column-2\"><strong>Polisens arbete vid cyberattacker<\/strong><br \/>\n<br \/>\n\u2022 Hur arbetar svensk polis med dataintr\u00e5ngsbrotten som ransomware och \u00f6verbelastningsattacker?<br \/>\n\u2022 Vikten av polisanm\u00e4lan och nationell och internationell samverkan<br \/>\n\u2022 Hur kan man f\u00f6rbygga attacker samt vad b\u00f6r man g\u00f6ra om det \u00e4nd\u00e5 intr\u00e4ffar?<br \/>\n<br \/>\n<i><strong>Bj\u00f6rn Eriksson, <\/strong>gruppchef komplexa cyberbrott (KCB), Polismyndigheten<\/i><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><strong>16:20<\/strong><\/td><td class=\"column-2\"><strong>Riskanalyser med Threat Intelligence i Realtid<\/strong><br \/>\n<br \/>\n\u2022 Hur ser dagens cyberhot ut?<br \/>\n\u2022 Hur kan organisationer dra nytta av b\u00e5de aggregerad och detaljerad hotinformation?<br \/>\n\u2022 Vilken roll spelar aktuell hotinformation i kontinuerlig riskanalys?<br \/>\n\u2022 Hur kan du snabbt agera n\u00e4r en ny s\u00e5rbarhet dyker upp som ett reellt hot och anv\u00e4nds mot andra organisationer?<br \/>\n\u2022 Hur kan du snabbt f\u00f6rst\u00e5 och agera p\u00e5 risker kopplat till om t.ex. n\u00e5gon av er organisations credentials blir stulna\/tillg\u00e4ngligg\u00f6rs?<br \/>\n\u2022 Hur bem\u00f6ter vi ramsonware med threat intelligence<br \/>\n\u2022 Generativ AI som hot och m\u00f6jlighet - hur f\u00f6r\u00e4ndras hotlandskapet?<br \/>\n<br \/>\n<i><strong>Julius Nicklasson, <\/strong>Sales Engineer p\u00e5 Recorded Future <\/i><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><strong>16:50<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn avrundar konferensen<\/strong><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><strong>17:00-18:00<\/strong><\/td><td class=\"column-2\"><strong>Avslutande mingel och diskussioner f\u00f6r utbyte med dryck och tilltugg!<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"wpb_content_element \"><style type=\"text\/css\">#ut_header_69de2ebca36bd h1.section-title { font-size:40px !important; }<\/style><header id=\"ut_header_69de2ebca36bd\" class=\"section-header  ut-no-title-linebreak-mobile ut-no-lead-linebreak-mobile pt-style-2 header-left header-tablet-left header-mobile-center\"><h1 data-title=\"PROGRAM\"  data-responsive-font=\"section_title\" data-responsive-font-settings=\"{&quot;base-font-size&quot;:&quot;40&quot;,&quot;font-size-unit&quot;:&quot;px&quot;,&quot;font-size&quot;:{&quot;desktop_large&quot;:&quot;40&quot;},&quot;base-line-height&quot;:&quot;global&quot;,&quot;base-letter-spacing&quot;:&quot;global&quot;}\" class=\"section-title  \"><span>PROGRAM<\/span><\/h1><div data-delay=\"0\" class=\"lead \"><p>2024<\/p>\n<\/div><\/header><\/div><style type=\"text\/css\">#bklyn_btn_69de2ebca39cb .bklyn-btn:hover{ color:#0a0a0a !important; }#bklyn_btn_69de2ebca39cb .bklyn-btn:focus{ color:#0a0a0a !important; }#bklyn_btn_69de2ebca39cb .bklyn-btn:active { color:#0a0a0a !important; }#bklyn_btn_69de2ebca39cb a.bklyn-btn { font-weight:100 !important; }#bklyn_btn_69de2ebca39cb.bklyn-btn-header a.bklyn-btn { font-weight:100 !important; }#bklyn_btn_69de2ebca39cb.bklyn-btn-header a.bklyn-btn span { font-weight:100 !important; }<\/style><div id=\"bklyn_btn_69de2ebca39cb\" class=\"bklyn-btn-holder  bklyn-btn-left bklyn-btn-tablet-left bklyn-btn-mobile-center\"><a title=\"Broschyr\"   href=\"https:\/\/insightevents.se\/cybersakerhet\/broschyr\/\" target=\"_self\" class=\"bklyn-btn  bklyn-btn-shadow bklyn-btn-normal\" ><span class=\"ut-btn-text\">LADDA NER PDF<\/span><\/a><\/div>[vc_column_text css=&#8221;&#8221;]\n<table id=\"tablepress-1-no-2\" class=\"tablepress tablepress-id-1\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><strong>08:30<\/strong><\/td><td class=\"column-2\"><strong>Registrering och morgonkaffe<\/strong><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>09:00<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn inleder konferensen<\/strong><br \/>\n<br \/>\n<i><strong>Ulrik Franke, <\/strong>Senior forskare, RISE Research Institutes of Sweden och adjungerad professor vid Kungliga Tekniska H\u00f6gskolan (KTH)<\/i><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>09:10<\/strong><\/td><td class=\"column-2\"><strong>Going from awareness to accountability among all employees<\/strong><br \/>\n<br \/>\nThe \u201cpeople\u201d factor is often ignored, yet it is a critical element in building a strong defence. But how do you create a sustainable security culture which is not built in a day? How do employees play an important role in<br \/>\nresilience to increased cyber threats.<br \/>\n<br \/>\n\u2022 Security starts from the top<br \/>\n\u2022 Credit Risk, Financial Risk, Cyber Risk and now \u2013 Human Risk<br \/>\n\u2022 One step ahead \u2013 of security threats<br \/>\n\u2022 Security everyone's business<br \/>\n<br \/>\n<i><strong>Helena Malm,<\/strong> Head of CISO Office, Swedbank<br \/>\n<strong>Jannica Passad,<\/strong> Information Security Officer, Swedbank<\/i><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>09:50<\/strong><\/td><td class=\"column-2\"><strong>DORA i praktiken \u2013 Identifiering av kritiska eller viktiga funktioner hos Norion Bank<\/strong><br \/>\n<br \/>\n\u2022 Hur kan god k\u00e4nnedom om verksamhetens processer och funktioner f\u00f6rb\u00e4ttra s\u00e4kerheten?<br \/>\n\u2022 Hur har Norion Bank i sitt arbete med DORA i praktiken identifierat bankens kritiska eller viktiga funktioner<br \/>\n\u2022 Hur m\u00f6jligg\u00f6r detta en tydligare s\u00e4kerhetskravst\u00e4llning p\u00e5 Bankens IKT-tj\u00e4nster och \u00f6kad robusthet<br \/>\n<br \/>\n<i><strong>Christoffer Umeland, <\/strong>Chief Security Officer (CSO), Norion Bank Group<\/i><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>10:30<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rmiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><strong>11:00<\/strong><\/td><td class=\"column-2\"><strong>Insikter fr\u00e5n n\u00e5gra Doraprojekt<\/strong><br \/>\n<br \/>\n\u2022 Erfarenheter fr\u00e5n ett antal Doraprojekt<br \/>\n\u2022 Vad \u00e4r en ikt-tj\u00e4nst och inte?<br \/>\n\u2022 Hur ska man angripa testprogrammet?<br \/>\n<br \/>\n<i><strong>Stefan Funck Pettersson, <\/strong>consultant &amp; partner, Springflod <\/i><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><strong>11:30<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rst\u00e4rkt digital motst\u00e5ndskraft hos f\u00f6retag i den finansiella sektorn<\/strong><br \/>\n<br \/>\n\u2022 Vilka risker ser FI kopplat till den digitala utvecklingen inom finansiell sektor? <br \/>\n\u2022 Vilken roll har FI?<br \/>\n\u2022 Hur kan den digitala motst\u00e5ndskraften hos f\u00f6retagen i den finansiella sektorn st\u00e4rkas?<br \/>\n<br \/>\n<i><strong>Linda L\u00f6fgren,<\/strong> avdelningschef Motst\u00e5ndskraft och beredskap, Finansinspektionen<\/i><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><strong>12:00<\/strong><\/td><td class=\"column-2\"><strong>Lunch med n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><strong>13:10<\/strong><\/td><td class=\"column-2\"><strong>PANELDISKUSSION<br \/>\nCyberhoten i v\u00e4rlden \u00f6kar och riktar sig allt oftare mot samh\u00e4llsviktiga funktioner som finanssektorn \u2013 hur m\u00f6ter vi hoten p\u00e5 b\u00e4sta s\u00e4tt?<\/strong><br \/>\n<br \/>\n<br \/>\nPanelen leds av <i><strong>Ulrik Franke,<\/strong> Senior forskare, RISE Research Institutes of Sweden och adjungerad professor vid Kungliga Tekniska H\u00f6gskolan (KTH)<\/i><br \/>\n<br \/>\nPaneldeltagare:<br \/>\n<i><strong>Magnus Jacobson,<\/strong> Senior Adviser Cyber Security, Svenska Bankf\u00f6reningen<br \/>\n<strong>Kevin Aytap,<\/strong> Independant Advisor och fd. CISO Avanza, Riksbanken och SEB <br \/>\n<strong>Rose-Mharie \u00c5hlfeldt,<\/strong> Professor in Informatics, Ph D, School of Informatics, University of Sk\u00f6vde<br \/>\n<br \/>\nPaneldeltagare uppdateras l\u00f6pande<\/i><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><strong>13:40<\/strong><\/td><td class=\"column-2\"><strong>AI in a Bank \u2013 the Good and the Ugly<\/strong><br \/>\n<br \/>\nAs artificial intelligence continues to transform the banking industry, it's essential to understand both the tremendous benefits it brings and the potential risks and challenges it poses. AI plays a crucial role in protecting customer data and assets, leveraging its capabilities to enhance security and operational efficiency. Let's delve into the good and the ugly sides of AI in banking. <br \/>\n<br \/>\nThe Good Enhanced Security and Protection of Customer Data:<br \/>\n\u2022 AI-driven systems use advanced encryption techniques and real-time monitoring to safeguard customer data from breaches and unauthorized access.<br \/>\n\u2022 Machine learning models predict and mitigate potential security threats, ensuring the integrity and confidentiality of sensitive information. <br \/>\n<br \/>\nPredictive Analytics for Proactive Services:<br \/>\n\u2022 AI-powered predictive analytics forecast market trends and customer behaviors, enabling banks to offer proactive financial products and services.<br \/>\n\u2022 AI algorithms analyze vast amounts of data to predict credit risks and tailor loan offerings, improving lending accuracy and customer satisfaction.<br \/>\n<br \/>\nThe Ugly Security and Privacy Concerns:<br \/>\n\u2022 AI systems can be targeted by sophisticated cyber-attacks, potentially compromising sensitive customer data.<br \/>\n\u2022 The use of AI in data processing raises significant privacy issues, requiring stringent regulatory compliance.<br \/>\n<br \/>\nBias and Ethical Issues:<br \/>\n\u2022 AI algorithms can inadvertently perpetuate biases present in the training data, leading to unfair treatment of customers.<br \/>\n\u2022 The lack of transparency in AI decision-making processes can result in ethical dilemmas and mistrust among customers.<br \/>\n<br \/>\n<i><strong>Ulf Larsson,<\/strong>Group Security CTO, SEB<\/i><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><strong>14:10<\/strong><\/td><td class=\"column-2\"><strong>Kvantifierad hotanalys och viktning av risker - identifiera, kvantifiera och prioritera risker f\u00f6r att effektivt skydda organisationens tillg\u00e5ngar och intressen<\/strong><br \/>\n\t<br \/>\n\u2022 S\u00e5 kan du hantera risker och rangordna dem p\u00e5 ett s\u00e4tt som m\u00f6jligg\u00f6r b\u00e4ttre beslutsfattande och resursallokering i dagens komplexa s\u00e4kerhetslandskap<br \/>\n\u2022 Introduktion av en kvantitativ metod f\u00f6r att analysera hot och s\u00e4tta vikter p\u00e5 risker baserat p\u00e5 en strukturerad bed\u00f6mning av hot-scenarier<br \/>\n\u2022 Utifr\u00e5n FAIR-ramverket (Factor Analysis of Information Risk) kommer vi att utforska hur faktorerna nedan kan kombineras f\u00f6r att ber\u00e4kna riskvikter:<br \/>\n-\tHotfrekvens<br \/>\n-\tF\u00f6rlustfaktorer<br \/>\n-\tOrganisationens skyddsstyrka<br \/>\n<br \/>\n<i><strong>Johan Svenfelt,<\/strong> Senior Manager - Cyber Security, advisense<\/i><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><strong>14:40<\/strong><\/td><td class=\"column-2\"><strong>Eftermiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><strong>15:10<\/strong><\/td><td class=\"column-2\"><strong>Att komma tillbaka efter en hackerattack \u2013 en digitaliseringsresa<\/strong><br \/>\n<br \/>\n\u2022 Vilka konsekvenser f\u00e5r en attack \u2013 vad gjorde vi och vilka fr\u00e5gest\u00e4llningar fick vi hantera?<br \/>\n\u2022 Att strukturera och skapa rutiner f\u00f6r att minimera risken f\u00f6r kommande ransomware-attacker?<br \/>\n\u2022 Krishantering om det v\u00e4rsta sker och vikten av att agera i tid men ocks\u00e5 med r\u00e4tt \u00e5tg\u00e4rder<br \/>\n\u2022 Att f\u00e5 med sig ledningsgruppen och f\u00f6rst\u00e5 allvaret i situationen<br \/>\n<br \/>\n<i><strong>Anna Stewart, <\/strong>Information Technology Infrastructure Operations Manager, Bakels Sweden<\/i><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><strong>15:40<\/strong><\/td><td class=\"column-2\"><strong>Polisens arbete vid cyberattacker<\/strong><br \/>\n<br \/>\n\u2022 Hur arbetar svensk polis med dataintr\u00e5ngsbrotten som ransomware och \u00f6verbelastningsattacker?<br \/>\n\u2022 Vikten av polisanm\u00e4lan och nationell och internationell samverkan<br \/>\n\u2022 Hur kan man f\u00f6rbygga attacker samt vad b\u00f6r man g\u00f6ra om det \u00e4nd\u00e5 intr\u00e4ffar?<br \/>\n<br \/>\n<i><strong>Bj\u00f6rn Eriksson, <\/strong>gruppchef komplexa cyberbrott (KCB), Polismyndigheten<\/i><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><strong>16:20<\/strong><\/td><td class=\"column-2\"><strong>Riskanalyser med Threat Intelligence i Realtid<\/strong><br \/>\n<br \/>\n\u2022 Hur ser dagens cyberhot ut?<br \/>\n\u2022 Hur kan organisationer dra nytta av b\u00e5de aggregerad och detaljerad hotinformation?<br \/>\n\u2022 Vilken roll spelar aktuell hotinformation i kontinuerlig riskanalys?<br \/>\n\u2022 Hur kan du snabbt agera n\u00e4r en ny s\u00e5rbarhet dyker upp som ett reellt hot och anv\u00e4nds mot andra organisationer?<br \/>\n\u2022 Hur kan du snabbt f\u00f6rst\u00e5 och agera p\u00e5 risker kopplat till om t.ex. n\u00e5gon av er organisations credentials blir stulna\/tillg\u00e4ngligg\u00f6rs?<br \/>\n\u2022 Hur bem\u00f6ter vi ramsonware med threat intelligence<br \/>\n\u2022 Generativ AI som hot och m\u00f6jlighet - hur f\u00f6r\u00e4ndras hotlandskapet?<br \/>\n<br \/>\n<i><strong>Julius Nicklasson, <\/strong>Sales Engineer p\u00e5 Recorded Future <\/i><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><strong>16:50<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn avrundar konferensen<\/strong><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><strong>17:00-18:00<\/strong><\/td><td class=\"column-2\"><strong>Avslutande mingel och diskussioner f\u00f6r utbyte med dryck och tilltugg!<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] PROGRAM 15 NOVEMBER 2023 I STOCKHOLM [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-81","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Program - Cybers\u00e4kerhet inom den finansiella sektorn<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.se\/cybersakerhet\/program\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - Cybers\u00e4kerhet inom den finansiella sektorn\" \/>\n<meta property=\"og:description\" content=\"[vc_section][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] PROGRAM 15 NOVEMBER 2023 I STOCKHOLM [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.se\/cybersakerhet\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybers\u00e4kerhet inom den finansiella sektorn\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-04T09:02:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/program\\\/\",\"url\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/program\\\/\",\"name\":\"Program - Cybers\u00e4kerhet inom den finansiella sektorn\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/#website\"},\"datePublished\":\"2022-02-01T11:11:33+00:00\",\"dateModified\":\"2024-07-04T09:02:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/program\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/program\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hem\",\"item\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/#website\",\"url\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/\",\"name\":\"Cybers\u00e4kerhet inom den finansiella sektorn\",\"description\":\"\u00c4nnu en webbplats hos Insight Events Sweden Websites\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/insightevents.se\\\/cybersakerhet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - Cybers\u00e4kerhet inom den finansiella sektorn","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.se\/cybersakerhet\/program\/","og_locale":"sv_SE","og_type":"article","og_title":"Program - Cybers\u00e4kerhet inom den finansiella sektorn","og_description":"[vc_section][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] PROGRAM 15 NOVEMBER 2023 I STOCKHOLM [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]","og_url":"https:\/\/insightevents.se\/cybersakerhet\/program\/","og_site_name":"Cybers\u00e4kerhet inom den finansiella sektorn","article_modified_time":"2024-07-04T09:02:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Ber\u00e4knad l\u00e4stid":"1 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.se\/cybersakerhet\/program\/","url":"https:\/\/insightevents.se\/cybersakerhet\/program\/","name":"Program - Cybers\u00e4kerhet inom den finansiella sektorn","isPartOf":{"@id":"https:\/\/insightevents.se\/cybersakerhet\/#website"},"datePublished":"2022-02-01T11:11:33+00:00","dateModified":"2024-07-04T09:02:22+00:00","breadcrumb":{"@id":"https:\/\/insightevents.se\/cybersakerhet\/program\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.se\/cybersakerhet\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.se\/cybersakerhet\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hem","item":"https:\/\/insightevents.se\/cybersakerhet\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.se\/cybersakerhet\/#website","url":"https:\/\/insightevents.se\/cybersakerhet\/","name":"Cybers\u00e4kerhet inom den finansiella sektorn","description":"\u00c4nnu en webbplats hos Insight Events Sweden Websites","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.se\/cybersakerhet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/pages\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":21,"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/pages\/81\/revisions"}],"predecessor-version":[{"id":4062,"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/pages\/81\/revisions\/4062"}],"wp:attachment":[{"href":"https:\/\/insightevents.se\/cybersakerhet\/wp-json\/wp\/v2\/media?parent=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}