{"id":7479,"date":"2018-09-17T21:10:32","date_gmt":"2018-09-17T21:10:32","guid":{"rendered":"http:\/\/themeforest.unitedthemes.com\/wpversions\/brooklyn\/xml\/demo23\/about\/"},"modified":"2026-04-23T14:58:25","modified_gmt":"2026-04-23T12:58:25","slug":"program","status":"publish","type":"page","link":"https:\/\/insightevents.se\/scada\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section][vc_row][vc_column]<div class=\"wpb_content_element  vc_custom_1776865617134\"><style type=\"text\/css\">#ut_header_69ee5b05a23b5 h2.section-title { font-size:40px !important;letter-spacing:-0.03em; }#ut_header_69ee5b05a23b5 .lead ins { color:#333333; }#ut_header_69ee5b05a23b5 .lead ins { font-weight:bold; }<\/style><header id=\"ut_header_69ee5b05a23b5\" class=\"section-header  ut-no-title-linebreak-mobile ut-no-lead-linebreak-mobile pt-style-1 header-center header-tablet-center header-mobile-center\"><h2 data-title=\"PROGRAM 2026\"  data-responsive-font=\"section_title\" data-responsive-font-settings=\"{&quot;base-font-size&quot;:&quot;global&quot;,&quot;font-size&quot;:{&quot;desktop_large&quot;:&quot;40&quot;},&quot;base-line-height&quot;:&quot;global&quot;,&quot;base-letter-spacing&quot;:&quot;global&quot;,&quot;letter-spacing&quot;:{&quot;desktop_large&quot;:&quot;-0.03&quot;}}\" class=\"bklyn-divider-styles bklyn-divider-style-1 section-title \"><span>PROGRAM 2026<\/span><\/h2><\/header><\/div><style type=\"text\/css\">#bklyn_btn_69ee5b05a4b99 a.bklyn-btn { font-weight:500 !important; }#bklyn_btn_69ee5b05a4b99.bklyn-btn-header a.bklyn-btn { font-weight:500 !important; }#bklyn_btn_69ee5b05a4b99.bklyn-btn-header a.bklyn-btn span { font-weight:500 !important; }<\/style><div id=\"bklyn_btn_69ee5b05a4b99\" class=\"bklyn-btn-holder  bklyn-btn-center bklyn-btn-tablet-center bklyn-btn-mobile-center\"><a title=\"Broschyr\"   href=\"https:\/\/insightevents.se\/scada\/wp-content\/uploads\/sites\/19\/2026\/04\/SCADA-OT-sakerhet-2026.pdf\" target=\"_self\" class=\"bklyn-btn  bklyn-btn-normal\" ><span class=\"ut-btn-text\">LADDA NER PDF<\/span><\/a><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_column_text]<div class=\"ut-one-half  \">\n<!-- the tabs --><ul class=\"ut-nav-tabs clearfix\"><li class=\"active\"><a href=\"#t1Tab\" data-toggle=\"tab\">DAG 1 \u2022 TISDAGEN DEN 29 SEPTEMBER <\/a><\/li>\n<li ><a href=\"#t2Tab\" data-toggle=\"tab\">DAG 2 \u2022 ONSDAGEN DEN 30 SEPTEMBER <\/a><\/li><\/ul>\n<!-- tab \"panes\" --><div class=\"ut-tab-content entry-content clearfix\"><div class=\"tab-pane active  clearfix\" id=\"t1Tab\">\n\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><strong>08:30<\/strong><\/td><td class=\"column-2\"><strong>Registrering och morgonkaffe<\/strong><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>09:00<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn inleder konferensen<\/strong><br \/>\n<br \/>\n<i><strong>John Lindstr\u00f6m,<\/strong> professor cybers\u00e4kerhet, verksamhetsledare Centrum f\u00f6r s\u00e4kerhet i samh\u00e4lle och kritiska infrastrukturer, Lule\u00e5 tekniska universitet Sverige<\/i><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>09:10<\/strong><\/td><td class=\"column-2\"><strong>Cyber Resilience Act (CRA) och dess stora p\u00e5verkan p\u00e5 SCADA\/OT<\/strong><br \/>\n<br \/>\n\u2022 Fr\u00e5n statiskt till dynamiskt: OT-system g\u00e5r fr\u00e5n att vara isolerade och stabila till att bli milj\u00f6er som kr\u00e4ver kontinuerliga uppdateringar<br \/>\n\u2022 Nya tekniska krav: \u00d6kat fokus p\u00e5 regelbunden patchning, aktiv s\u00e5rbarhetshantering och krav p\u00e5 transparens, exempelvis genom SBOM<br \/>\n\u2022 Kritisk leverant\u00f6rskedja: Organisationer m\u00e5ste kunna st\u00e4lla krav, f\u00f6lja upp och validera att leverant\u00f6rer uppfyller CRA, vilket f\u00f6r\u00e4ndrar b\u00e5de upphandling och f\u00f6rvaltning<br \/>\n\u2022 Sektorsspecifika utmaningar: J\u00e4rnv\u00e4g och kollektivtrafik \u00e4r tydliga exempel p\u00e5 sektorer d\u00e4r CRA f\u00e5r stor p\u00e5verkan<br \/>\n\u2022 Strategisk drivkraft: Den viktigaste slutsatsen \u00e4r att CRA fungerar som en motor f\u00f6r att skapa mer robusta, transparenta och framtidss\u00e4kra OT-milj\u00f6er, snarare \u00e4n att bara vara ett passivt regelverk<br \/>\n<br \/>\n<i><strong>Anders Jonsson,<\/strong> Senior Advisor Cyber Security, NIS2, CER &amp; CRA Expert, AH CyberSec &amp; Member Enisa AHWG EUCS Cloud Services, European Union Agency for Cybersecurity (ENISA)<br \/>\n<\/i><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>10:00<\/strong><\/td><td class=\"column-2\"><strong>NIS2 &amp; CRA Implementation in OT Environments: From Compliance to Operational Security<\/strong><br \/>\n<br \/>\n\u2022 Decode NIS2 and CRA requirements specific to OT\/ICS environments<br \/>\n\u2022 Map regulatory obligations to existing OT architectures<br \/>\n\u2022 Implement compliance without operational disruption<br \/>\n\u2022 Build sustainable security governance frameworks<br \/>\n\u2022 Prepare for audits and third-party assessments<br \/>\n<br \/>\n<i><strong>Hanne M. Hansen, <\/strong>Head of OT Security, Bureau Veritas<\/i><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>10:20<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rmiddagskaffe, n\u00e4tverkande och LiveHacking<\/strong><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><strong>11:00<\/strong><\/td><td class=\"column-2\"><strong>Hur kan vi st\u00f6dja det svenska samh\u00e4llet i arbetet med att hantera och f\u00f6rebygga it-s\u00e4kerhetsincidenter?<\/strong><br \/>\n<br \/>\n\u2022 Agera vid intr\u00e4ffade it-s\u00e4kerhetsincidenter genom att sprida information och st\u00f6tta verksamheter i arbetet med att avhj\u00e4lpa eller lindra effekter av det intr\u00e4ffade<br \/>\n\u2022 Samordna insatser vid st\u00f6rre it-s\u00e4kerhetsincidenter<br \/>\n\u2022 Samverka med myndigheterna inom det nationella Cybers\u00e4kerscentret (NCSC-SE)<br \/>\n\u2022 Vara Sveriges kontaktpunkt gentemot motsvarande funktioner i andra l\u00e4nder samt att utveckla samarbetet och informationsutbytet med dessa<br \/>\n<br \/>\n<i>Talare fr\u00e5n CERT-SE - Sveriges nationella Computer Emergency Response Team<\/i><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><strong>11:40<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6renklad regulatorisk efterlevnad med hj\u00e4lp av datadioder<\/strong><br \/>\n<br \/>\n\u2022 S\u00e5 s\u00e4kerst\u00e4ller Advenicas datadioder data\u00f6verf\u00f6ring genom ett enkelriktat fl\u00f6de mellan tv\u00e5 n\u00e4tverk, f\u00f6r att skydda den k\u00e4nsliga infrastrukturen f\u00f6r olika produktionsmilj\u00f6er<br \/>\n\u2022 Genom kundscenarier visar vi hur organisationer p\u00e5 ett enkelt s\u00e4tt kan m\u00f6ta \u00f6kande regulatoriska krav, inklusive NIS2-direktivet och standarder som IEC 62443 och samtidigt skydda sig mot avsiktliga s\u00e5 v\u00e4l som oavsiktliga incidenter<br \/>\n<br \/>\n<i><strong>Mikael Holmgren, <\/strong>Executive Sales Representative, Advenica<\/i><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><strong>12:00<\/strong><\/td><td class=\"column-2\"><strong>Lunch och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><strong>13:10<\/strong><\/td><td class=\"column-2\"><strong>Vad vi faktiskt ser i OT-n\u00e4t \u2013 ett \u00e5r av detektioner och insikter<\/strong><br \/>\n<br \/>\n<i><strong>Joakim Elgh, <\/strong>Detection Engineer, Sectra Critical Infrastructure och representant fr\u00e5n energif\u00f6retag<\/i><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><strong>13:30<\/strong><\/td><td class=\"column-2\"><strong>How Computers Kill People: Computer based systems dependencies in safety critical industries and how 346 people died partly because of poor software engineering and design<\/strong><br \/>\n<br \/>\n\u2022 System Dependencies: How modern industries (aviation, maritime, energy) build in a total reliance on software, meaning a minor bug can lead to physical, fatal consequences<br \/>\n\u2022 MCAS (Maneuvering Characteristics Augmentation System): How the software system was prioritized over pilot control, and how a lack of redundancy became the direct cause of a fatal accident<br \/>\n\u2022 Human vs. Machine: The dangerous trend of allowing software to make autonomous decisions without the operator having full visibility or the ability to intervene quickly<br \/>\n\u2022 Lessons for the Maritime Industry: The transition to autonomous systems and increased digitalization means the industry must learn from aviation's mistakes to avoid \"cyber-physical\" accidents at sea<br \/>\n<br \/>\n<i><strong>Christopher Stein, <\/strong>Expert in Maritime Cybersecurity, Maritime Cyber Guild<br \/>\n<br \/>\nMaritime Cyber Guild is a non-profit organization dedicated to advancing cybersecurity within the maritime industry.<\/i><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><strong>14:20<\/strong><\/td><td class=\"column-2\"><strong>Eftermiddagskaffe, n\u00e4tverkande och LiveHacking<\/strong><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><strong>15:00<\/strong><\/td><td class=\"column-2\"><strong>HETA STOLEN: INTERVJU<br \/>\nVad \u00e4r status f\u00f6r s\u00e4kerheten i Sverige i en os\u00e4ker omv\u00e4rld? <\/strong><br \/>\n<br \/>\nUppdatera dig kring det senaste om s\u00e4kerhetsl\u00e4get med <strong>J\u00f6rgen Holmlund<\/strong>, \u00e5rets Trygghetsambassad\u00f6r och tidigare polis\u00f6verintendent samt en av Sveriges mest erfarna s\u00e4kerhetsexperter. Med en gedigen bakgrund inom Polisen och omfattande erfarenhet av s\u00e4kerhetsarbete, inklusive tj\u00e4nstg\u00f6ring inom F\u00f6rsvarsmakten b\u00e5de nationellt och internationellt, har han etablerat sig som en ledande auktoritet inom omr\u00e5det. Dessutom var han en nyckelperson i arbetsgruppen som utvecklade FN:s handbok i milit\u00e4r underr\u00e4ttelsetj\u00e4nst. Under denna intervju f\u00e5r du en aktuell \u00f6verblick av hur J\u00f6rgen ser p\u00e5 statusen f\u00f6r s\u00e4kerheten i Sverige och den allt mer os\u00e4kra omv\u00e4rld som vi alla lever i.<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><strong>15:30<\/strong><\/td><td class=\"column-2\"><strong>Att navigera i ett os\u00e4kert hotlandskap: AI:s int\u00e5g och den nya verkligheten vi m\u00e5ste anpassa oss till i omv\u00e4rldsl\u00e4get<\/strong><br \/>\n<br \/>\n\u2022 V\u00e4xande gap mellan anfallare och f\u00f6rsvarare: Avst\u00e5ndet mellan de som attackerar och de som f\u00f6rsvarar \u00f6kar st\u00e4ndigt, drivet av teknisk komplexitet och ett alltmer os\u00e4kert omv\u00e4rldsl\u00e4ge<br \/>\n\u2022 Int\u00e5get av AI har accelererat takten och sofistikeringsgraden i cyberattacker, vilket g\u00f6r det sv\u00e5rare att identifiera verkliga hot i ett konstant brus av larm<br \/>\n\u2022 F\u00f6r att m\u00f6ta verkligheten med AI-drivna angrepp m\u00e5ste f\u00f6rsvarsstrategier utvecklas i en h\u00f6gre takt \u00e4n hoten sj\u00e4lva<br \/>\n\u2022 Fr\u00e5n reaktion till proaktivitet: Slutsatsen \u00e4r att organisationer beh\u00f6ver st\u00e4lla om f\u00f6r att kunna filtrera bort bruset och fokusera p\u00e5 de mest kritiska och faktiska hoten i en f\u00f6r\u00e4nderlig v\u00e4rld<br \/>\n\u2022 Omv\u00e4rlden \u00e4r i en ruskigt snabb f\u00f6r\u00e4ndring och presentationen kommer<br \/>\n<br \/>\n<i><strong>Jacob Henricson, <\/strong>VD, N\u00f8rdsnipe och r\u00e5dgivare, Cybercampus Sverige KTH<\/i><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><strong>16:10<\/strong><\/td><td class=\"column-2\"><strong>Alla pratar om cybers\u00e4kerhet \u2013 men hur n\u00e5r vi dit?<\/strong><br \/>\n<br \/>\nTrots avancerad teknik beror \u00f6ver 90 % av alla cyberattacker p\u00e5 m\u00e4nskligt beteende. Hur ser det ut f\u00f6r svenska f\u00f6retag och organisationer i Sverige?<br \/>\n<br \/>\n\u2022 Etablera en h\u00e5llbar cybers\u00e4kerhetskultur p\u00e5 jobbet:<br \/>\n1. Skapa r\u00e4tt f\u00f6ruts\u00e4ttningar: Arbetsgivare beh\u00f6ver l\u00e4ra sig att skapa strukturer och riktlinjer<br \/>\n2. Skaffa r\u00e4tt kompetens: Kompetensutveckling av personal f\u00f6rb\u00e4ttrar anv\u00e4ndarbeteende i organisationen<br \/>\n\u2022 En guide f\u00f6r hur arbetsgivare g\u00e5r tillv\u00e4ga f\u00f6r att kompetensutveckla sin personal<br \/>\n<br \/>\n<i><strong>Mette Svensson, <\/strong>Project Manager, Cybercampus Sverige KTH<\/i><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><strong>16:50<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn avslutar den f\u00f6rsta konferensdagen<\/strong><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><strong>17:00-18:00<\/strong><\/td><td class=\"column-2\"><strong>N\u00e4tverksmingel<\/strong><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><strong>18:20<\/strong><\/td><td class=\"column-2\"><strong>Konferensmiddag<\/strong><br \/>\n<br \/>\nForts\u00e4tt dialogen med konferensdeltagarna och knyt nya kontakter samtidigt som du njuter av god mat och dryck.<br \/>\n<i>OBS! Anm\u00e4lan kr\u00e4vs och vi reserverar oss f\u00f6r att middagen kan bli fullbokad.<\/i><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/p>\n<\/div>\n<div class=\"tab-pane   clearfix\" id=\"t2Tab\">\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><strong>08:30<\/strong><\/td><td class=\"column-2\"><strong>Morgonkaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>09:00<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn inleder den andra konferensdagen<\/strong><br \/>\n<br \/>\n<i><strong>John Lindstr\u00f6m,<\/strong> professor cybers\u00e4kerhet, verksamhetsledare Centrum f\u00f6r s\u00e4kerhet i samh\u00e4lle och kritiska infrastrukturer, Lule\u00e5 tekniska universitet Sverige<\/i><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>09:10<\/strong><\/td><td class=\"column-2\"><strong>Vad kan vi l\u00e4ra oss av cyberattacken mot Svenska kyrkan?<\/strong><br \/>\n<br \/>\n\u2022 Mina erfarenheter som ledare under cyberattacken mot Svenska kyrkan<br \/>\n\u2022 Hur vi hanterade krisen, kommunicerade och nystartade verksamheten<br \/>\n\u2022 Vad jag l\u00e4rde mig om ledarskap, kultur och samarbete n\u00e4r allt sattes p\u00e5 prov<br \/>\n<br \/>\n<i><strong>Andreas Synning, <\/strong>IT-chef, IT-Centrum<\/i><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>09:50<\/strong><\/td><td class=\"column-2\"><strong>Nytt cyberf\u00f6rsvarsf\u00f6rband f\u00f6rsvarar civil infrastruktur<\/strong><br \/>\n<br \/>\nHuvudsyftet med cyberf\u00f6rsvarsf\u00f6rbandet \u00e4r att f\u00f6rsvara kritisk civil infrastruktur som F\u00f6rsvarsmakten \u00e4r beroende av f\u00f6r att l\u00f6sa sin huvuduppgift; f\u00f6rsvaret av Sverige och v\u00e5ra allierade. Under presentationen kommer \u00f6verstel\u00f6jtnant Tomas Wallin, chef f\u00f6r 4:e cyberf\u00f6rsvarsf\u00f6rbandet att ber\u00e4tta mer om satsningen p\u00e5 denna kritiska verksamhet f\u00f6r v\u00e5r framtid. Vad inneb\u00e4r satsningen:<br \/>\n<br \/>\n\u2022 Nytt f\u00f6rband: F\u00f6rsvarsmakten har inr\u00e4ttat ett fj\u00e4rde cyberf\u00f6rsvarsf\u00f6rband<br \/>\n\u2022 Huvuduppdrag: Att f\u00f6rsvara kritisk infrastruktur som myndigheten sj\u00e4lv inte \u00e4ger eller styr \u00f6ver<br \/>\n\u2022 Prioriterade sektorer: Verksamheten fokuserar inledningsvis p\u00e5 finans, energi och telekommunikation<br \/>\n\u2022 Placering: F\u00f6rbandet \u00e4r baserat i M\u00e4lardalsomr\u00e5det<br \/>\n\u2022 Personal: Best\u00e5r huvudsakligen av civila cybers\u00e4kerhetsspecialister och officerare<br \/>\n<br \/>\n<i><strong>Tomas Wallin, <\/strong>chef f\u00f6r fj\u00e4rde cyberf\u00f6rsvarsf\u00f6rbandet som \u00e4r inriktade p\u00e5 cyberf\u00f6rsvar av kritisk infrastruktur, F\u00f6rsvarsmakten<\/i><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>10:30<\/strong><\/td><td class=\"column-2\"><strong>F\u00f6rmiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><strong>11:10<\/strong><\/td><td class=\"column-2\"><strong>Fr\u00e5n blanka l\u00f6senord till inbyggd s\u00e4kerhet: Resan mot \"Secure by Default\"<\/strong><br \/>\n<br \/>\n\u2022 Regelverk m\u00f6ter verklighet: Vi reder ut kraven i CRA, NIS2 och Maskinf\u00f6rordningen. Vi f\u00f6rklarar varf\u00f6r \"NIS2-certifierade produkter\" \u00e4r en myt, och hur vi ist\u00e4llet m\u00f6ter kraven genom funktionell efterlevnad och inbyggda skydd i styrsystemet<br \/>\n\u2022 Att patcha en anl\u00e4ggning som k\u00f6rs (IT vs. OT): I IT-v\u00e4rlden styr dataskydd (CIA) och automatisk patchning. I OT \u00e4r tillg\u00e4ngligheten allt (AIC) och en omstart kan kosta miljoner. Vi tittar p\u00e5 hanteringen av uppdatering beroende p\u00e5 system<br \/>\n\u2022 Evolutionen mot \"Secure by Default\": Praktiska exempel p\u00e5 hur styrsystemen anpassas. Fr\u00e5n att tv\u00e4tta bort arvet av \"blanka l\u00f6senord\", till att implementera moderna metoder som Trust on First Use (TOFU) eller krypterad kommunikation<br \/>\n<br \/>\n<i><strong>Mattias Nilsson,<\/strong> Product Specialist Security, Application Support Building Automation, Beckhoff Automation<\/i><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><strong>12:00<\/strong><\/td><td class=\"column-2\"><strong>Lunch och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><strong>13:10<\/strong><\/td><td class=\"column-2\"><strong>Vi tar pulsen p\u00e5 SCADA &amp; OT-s\u00e4kerhet \u2013 liveunders\u00f6kning!<\/strong><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><strong>13:30<\/strong><\/td><td class=\"column-2\"><strong>How we Manage day-to-day Security Challenges across a complex technical Environment<\/strong><br \/>\n<br \/>\n<i><strong>Daniel Rosenring,<\/strong> Senior Specialist, Safety &amp; Cyber Security Embedded SW, Grundfos<\/i><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><strong>14:20<\/strong><\/td><td class=\"column-2\"><strong>Extended Purdue Model to meet new requirements in Industry4.0 settings<\/strong><br \/>\n<br \/>\n\u2022 Benefits and limitations of the current Purdue Model in Industry4.0 settings, which is used to model the set ups of process and manufacturing industries as well as critical infrastructures<br \/>\n\u2022 Extension of the Purdue model with IT\/OT\/ET Environments to achieve a cleaner security architecture with improved performance regarding production\/distribution processes. ET is Enterprise Technology which comprises assets such as equipment\/machines, systems and solutions that should not be in the IT nor OT environments<br \/>\n\u2022 Managing communications for ET assets based on a method to evaluate the need and suitability to be connected to internal and\/or external networks or not at all<br \/>\n<br \/>\n<i><strong>John Lindstr\u00f6m,<\/strong> professor cybers\u00e4kerhet, verksamhetsledare Centrum f\u00f6r s\u00e4kerhet i samh\u00e4lle och kritiska infrastrukturer, Lule\u00e5 tekniska universitet Sverige<\/i><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><strong>15:00<\/strong><\/td><td class=\"column-2\"><strong>Eftermiddagskaffe och n\u00e4tverkande<\/strong><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><strong>15:30<\/strong><\/td><td class=\"column-2\"><strong>Cyberresiliens i kritisk infrastruktur: Hur Swedavia arbetar f\u00f6r att s\u00e4kerst\u00e4lla att flygplatsverksamheten kan forts\u00e4tta \u00e4ven under p\u00e5g\u00e5ende cyberattacker eller tekniska st\u00f6rningar<\/strong><br \/>\n<br \/>\n<i><strong>Karl Castor,<\/strong> Head of Cyber Security, Swedavia<\/i><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><strong>16:10<\/strong><\/td><td class=\"column-2\"><strong>S\u00e4kerhet i den fj\u00e4rde industrirevolutionen \u2013 ett turbulent och os\u00e4kert aff\u00e4rslandskap<\/strong><br \/>\n<br \/>\n\u2022 Skall vi ha regelbaserade eller riskbaserade processer i ett turbulent aff\u00e4rslandskap?<br \/>\n\u2022 Att se cybers\u00e4kerhet som skydd av int\u00e4ktstr\u00f6mmar ist\u00e4llet f\u00f6r skydd av tekniken<br \/>\n\u2022 Cybers\u00e4kerhet som en del av kontinuitet, reselience och motst\u00e5ndskraft<br \/>\n\u2022 Cybers\u00e4kerhet - en viktig funktion som m\u00e5ste vara med i organisationens strategiplanering<br \/>\n<br \/>\n<i><strong>Ulf R\u00f6nndahl,<\/strong> grundare &amp; VD, Veralex AB<\/i><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><strong>16:50<\/strong><\/td><td class=\"column-2\"><strong>Moderatorn avslutar konferensen<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/p>\n<\/div><\/div>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7479","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Program - SCADA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.se\/scada\/program\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - SCADA\" \/>\n<meta property=\"og:description\" content=\"[vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.se\/scada\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"SCADA\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T12:58:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/program\\\/\",\"url\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/program\\\/\",\"name\":\"Program - SCADA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#website\"},\"datePublished\":\"2018-09-17T21:10:32+00:00\",\"dateModified\":\"2026-04-23T12:58:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/program\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/insightevents.se\\\/scada\\\/program\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hem\",\"item\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#website\",\"url\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/\",\"name\":\"SCADA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#organization\",\"name\":\"SCADA\",\"url\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/wp-content\\\/uploads\\\/sites\\\/19\\\/2024\\\/03\\\/pexels-cottonbro-studio-5473956.jpg\",\"contentUrl\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/wp-content\\\/uploads\\\/sites\\\/19\\\/2024\\\/03\\\/pexels-cottonbro-studio-5473956.jpg\",\"width\":5673,\"height\":3782,\"caption\":\"SCADA\"},\"image\":{\"@id\":\"https:\\\/\\\/insightevents.se\\\/scada\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - SCADA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.se\/scada\/program\/","og_locale":"sv_SE","og_type":"article","og_title":"Program - SCADA","og_description":"[vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section][vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][\/vc_section]","og_url":"https:\/\/insightevents.se\/scada\/program\/","og_site_name":"SCADA","article_modified_time":"2026-04-23T12:58:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Ber\u00e4knad l\u00e4stid":"1 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.se\/scada\/program\/","url":"https:\/\/insightevents.se\/scada\/program\/","name":"Program - SCADA","isPartOf":{"@id":"https:\/\/insightevents.se\/scada\/#website"},"datePublished":"2018-09-17T21:10:32+00:00","dateModified":"2026-04-23T12:58:25+00:00","breadcrumb":{"@id":"https:\/\/insightevents.se\/scada\/program\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.se\/scada\/program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.se\/scada\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hem","item":"https:\/\/insightevents.se\/scada\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.se\/scada\/#website","url":"https:\/\/insightevents.se\/scada\/","name":"SCADA","description":"","publisher":{"@id":"https:\/\/insightevents.se\/scada\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.se\/scada\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/insightevents.se\/scada\/#organization","name":"SCADA","url":"https:\/\/insightevents.se\/scada\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/insightevents.se\/scada\/#\/schema\/logo\/image\/","url":"https:\/\/insightevents.se\/scada\/wp-content\/uploads\/sites\/19\/2024\/03\/pexels-cottonbro-studio-5473956.jpg","contentUrl":"https:\/\/insightevents.se\/scada\/wp-content\/uploads\/sites\/19\/2024\/03\/pexels-cottonbro-studio-5473956.jpg","width":5673,"height":3782,"caption":"SCADA"},"image":{"@id":"https:\/\/insightevents.se\/scada\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/pages\/7479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/comments?post=7479"}],"version-history":[{"count":16,"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/pages\/7479\/revisions"}],"predecessor-version":[{"id":8740,"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/pages\/7479\/revisions\/8740"}],"wp:attachment":[{"href":"https:\/\/insightevents.se\/scada\/wp-json\/wp\/v2\/media?parent=7479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}