Schedule - Thursday Policy Day, Friday Technical Day
The Good, The Bad and The Ugly of technology in turbulent times
In an age where digital technology and artificial intelligence play an ever-expanding role in shaping our lives, the risks associated with their misuse in cyber- and hybrid warfare, and foreign influence operations and malign information campaigns are becoming increasingly significant. This lecture aims to deepen the understanding of how technology plays a role in these domains in our geopolitically turbulent times.The session will provide insights into the mechanisms by which technology is employed in cognitive warfare to create and amplify hybrid- cyber and malign information. It will explore both the opportunities AI presents for defending democratic values and the ethical challenges it poses. Participants will gain an understanding of how societies can build resilience against cognitive warfare while safeguarding core principles such as freedom of expression and democracy.
The Calm Before the Storm Before the Calm
Generative AI is changing cybersecurity faster than most organizations are prepared for. What began as a productivity tool for writing, coding, and analysis is quickly becoming something more consequential: a force multiplier for both attackers and defenders. As AI systems improve at programming, reasoning, and autonomous task execution, they are also becoming better at discovering vulnerabilities, mapping attack paths, and accelerating offensive operations. At the same time, these same capabilities can help defenders identify weaknesses earlier, prioritize the risks that matter most, and remediate vulnerabilities at greater speed and scale.This talk explores how AI is reshaping the cyber domain, why the balance between offense and defense may shift rapidly, and what that means for security leaders, practitioners, and organizations.
Space Security as a Pillar of National and Civil Resilience
As modern societies grow increasingly dependent on space-based systems for critical services, ranging from communication and navigation to emergency response and infrastructure coordination, the security and resilience of these systems have become essential components of both national and civil defence. This presentation explores the intersection of space security, cyber resilience, and societal preparedness, highlighting how threats to space assets can have cascading effects on civilian functions on the ground.
Participants will gain an overview of current and emerging risks to space‑dependent services, including cyberattacks, system disruptions, signal interference, and vulnerabilities within the expanding commercial and governmental space ecosystem. The session will also discuss strategic approaches to enhancing resilience, covering topics such as risk management, public–private collaboration, capability development, and integration of space considerations into broader civil defence planning.
Beyond Collaboration: Coordinated Action for Cyber Resilience in the Energy Sector From National Strategy to Operational Security
Energy production is fundamentally local, yet it has become a prime target and leverage point in geopolitical conflict. As cyber threats intensify - from state actors, organized crime, and broad opportunistic attacks - the energy sector must stay fast and adaptable. At the same time, it must sustain long-term operations across very different IT and OT lifecycles. This talk explains why “collaboration” is not enough. We need coordinated, practical action. We must reduce noise, avoid “cry wolf” effects, and reach every part of an organization - and the sector. Using real incidents and lessons learned from the energy domain, we connect national security policy and national cyber strategies to practical measures for availability, lifecycle-aware technology choices, and value-based protection - clarifying what matters most to keep critical energy services running.
Quantum is Here. Is Your Security?
What happens when a computer solves in one minute what the most powerful supercomputer would need 10,000 years to accomplish? Imagine your worst competitor being able to simulate and optimize what takes you months — in seconds. Or worse, that a hacker can easily take over your "secure network/data" that you've spent hundreds of thousands protecting. That sounds like science fiction. It no longer is! IBM Quantum and quantum computers represent an industrial revolution that is changing the rules of the game in cybersecurity, innovation, medical technology, and more. At the same time, quantum computers introduce new challenges in the world of cryptography. In this session we will explain what IBM Quantum can actually do today, what post quantum cryptography means, and how you can position yourself correctly before it's too late. Because it's already starting to become too late.
Cyber Defence in the Financial Supply Chain
In today’s threat landscape, even a near perfect security posture can’t guarantee safety since Cyber risk doesn’t stop at organizational borders. Modern businesses are tethered to a complex ecosystem of vendors, service providers, customers, and shared infrastructure, where someone else’s misfortune rapidly can become your own problem.
In this short session, SEB shares how our view of the threat landscape is shaping well informed, risk-based decisions and why engagement, not isolation, is becoming a critical security capability. We explore how security collaboration strengthens both us and our peers, and how purposeful security engagements can foster trust in business relationships while at the same time reduce collective risks.
We also examine the role of information and trust in countering fear, uncertainty, and doubt, and why blaming victims of cyber incidents is not only ineffective, but strategically harmful in a world where resilience depends on cooperation.
Between Regulation and Reality: Cyber Challenges for Saab
In an era defined by accelerating geopolitical tension, Saab faces a rapidly evolving threat landscape where nation state actors, strategic competitors, and supply‑chain adversaries increasingly target defence industry capabilities. These pressures intersect with Saab’s growing use of modern technology and a complex web of technical dependencies, creating both new opportunities and new vulnerabilities.
At the same time, the regulatory environment is expanding at unprecedented speed. Requirements grow more demanding every year, yet many inherited frameworks remain rooted in a confidentiality‑first mindset that no longer reflects modern operational realities. Regulatory shifts introduce further ambiguity as organisations adapt to rules that are still maturing.
AI adds another layer of transformation. Where we stand today is a mix of promise and turbulence: AI systems are powerful but dependent on vast volumes of high‑quality data, and the need to secure that data across systems, partners, and borders has never been greater.
Against this backdrop, Saab is navigating a pivotal moment. The organisation is modernising at high velocity, adapting to new technologies, strengthening resilience across its environment, and aligning security practices to meet both current and future demands. The pace is increasing, and the ability to move fast without compromising security or trust is becoming a defining capability.
Keynote speaker - Automated cyber defenses
We are entering an era where cyber attackers are deploying AI to increase the speed, scale and sophistication of attacks.In this environment, defenders must automate to keep the balance of power, and think about new ways to use AI and intelligence to improve the odds. This talk will focus on the requirements for and opportunities with automated cyber defenses.
What happens if you let a security novice hack your company for five years?
Life took an unexpected turn when I left an art career to study computer science, eventually pivoting to cybersecurity and making bug bounty my full-time livelihood. Bug bounties allow anyone to use big corporations as a playground for real-world security learning. I will walk through some of my favorite findings from my years hacking GitLab, demonstrating how curiosity and persistence can allow anyone to join the field of cybersecurity.
Chronomaly: Tick, Tock, Root
What happens when the kernel's own timekeeping mechanisms can be turned against it? Such was the case for CVE-2025-38352 – a vulnerability in the Linux / Android kernel's POSIX CPU timers implementation that was exploited in the wild. In this talk, I'll walk through the vulnerability and dissect Chronomaly, the exploit I built for it.
How to Reverse Engineering a BLE Gizmo
A friend and I bought some Baofeng UV5R-Mini walkie talkies, to find that the wireless programming feature was only supported by an ugly phone app. In this lecture, I'll teach you how to sniff BLE traffic on an unrooted Android phone, how to read that traffic to create your own wireless client, and how to compose your own client as a desktop or phone app. We'll have some good laughs about minor bugs and XOR encryption. We'll dive into the hardware, showing what this radio might be capable of after firmware patching, and how to patch the firmware.
The Disruptive Impact of Large Language Models on Capture the Flag Competitions and the Path Toward Fair Play
The Disruptive Impact of Large Language Models on Capture the Flag Competitions and the Path Toward Fair Play
Capture the Flag (CTF) competitions have long been one of cybersecurity's most effective training grounds, forging practical skills across cryptography, reverse engineering, web exploitation, and binary pwn. But the ground is shifting fast. Large language models can now solve a growing share of challenges with minimal human input, raising urgent questions about fairness, the validity of rankings, and whether participation still delivers the learning that justifies the effort.
This talk presents findings from a mixed-methods study of LLM impact on modern CTFs. Drawing on benchmarks of frontier models against public CTF datasets, case studies across jeopardy, attack–defence, and educational formats, and interviews with organisers, veteran players, and educators, we identify the challenge categories most exposed to automation and the patterns of LLM-assisted participation already visible in competitive play. Against this backdrop, we propose a safeguard framework combining tiered competition divisions, LLM-resistant challenge design, detection heuristics drawn from solve telemetry, and a draft community code of conduct.
Trigon: Expoliting a single vulnerability across versions and architectures
Trigon is a deterministic iOS kernel exploit based on CVE-2023-32434. In this talk, we will discuss how one vulnerability can be exploited across fourteen major iOS versions (iOS 3 - 16) and three distinct chipset architectures (armv7, arm64 and arm64e). This will include exploits techniques and strategies, and look into how different devices and versions required entirely different approaches.
Speakers 2026
Kristoffer HultgrenHead of Space Security, The Swedish Civil Defence Agency
Dr Kristoffer Hultgren is the Head of the Space Security Section at the Swedish Civil Defence and Resilience Agency (MCF). At MCF Dr Hultgren is responsible for the space related work which includes being the Director of both the Competent Galileo PRS Authority and the Competent Govsatcom Authority of Sweden in the EU.
Dr Hultgren holds a PhD degree in atmospheric physics from Stockholm University, a MSc degree in Space Technology from Luleå Technical University, a MSc degree in Space Physics from Université Paul Sabatier Toulouse III, and a BSc degree in Physics from Karlstad University.
Space Security as a Pillar of National and Civil Resilience
As modern societies grow increasingly dependent on space-based systems for critical services, ranging from communication and navigation to emergency response and infrastructure coordination, the security and resilience of these systems have become essential components of both national and civil defence. This presentation explores the intersection of space security, cyber resilience, and societal preparedness, highlighting how threats to space assets can have cascading effects on civilian functions on the ground.
Participants will gain an overview of current and emerging risks to space‑dependent services, including cyberattacks, system disruptions, signal interference, and vulnerabilities within the expanding commercial and governmental space ecosystem. The session will also discuss strategic approaches to enhancing resilience, covering topics such as risk management, public–private collaboration, capability development, and integration of space considerations into broader civil defence planning.
Carl HeathSenior Researcher in digital resilience at RISE: Center for Security Design and Innovation
Carl Heath is a senior researcher at the Center for Security Design and Innovation (CSDI) at RISE – Research Institutes of Sweden, as well as a researcher at the University of Gothenburg. He works in applied research relating to society's digital transformation, particularly concerning issues related to democracy, digital resilience, AI and innovation management. Carl has served as a Special Counsel for the protection of democratic dialogue for the Swedish government, examining democracy in the digital age, as it relates to disinformation, propaganda and hate speech.
He currently assists the Swedish Psychological Defense Agency as well as other agencies in applied research and innovation in the context of digital transformation, total defense and hybrid warfare. Carl Heath is also a board member of the Swedish eHealth Agency and a member of the Media Subsidies Council, a part of the Swedish Media Authority. He won the Swedish eGovernment Awards in 2020 and is an international keynote speaker.
The Good, The Bad and The Ugly of technology in turbulent times
In an age where digital technology and artificial intelligence play an ever-expanding role in shaping our lives, the risks associated with their misuse in cyber- and hybrid warfare, and foreign influence operations and malign information campaigns are becoming increasingly significant. This lecture aims to deepen the understanding of how technology plays a role in these domains in our geopolitically turbulent times.The session will provide insights into the mechanisms by which technology is employed in cognitive warfare to create and amplify hybrid- cyber and malign information. It will explore both the opportunities AI presents for defending democratic values and the ethical challenges it poses. Participants will gain an understanding of how societies can build resilience against cognitive warfare while safeguarding core principles such as freedom of expression and democracy.
FaithLead Security Researcher
Faith is a Lead Blockchain Security Researcher. He previously worked as a vulnerability researcher at Dataflow Security, and has continued doing vulnerability research
in his free time. Most recently, he found a vulnerability in the Linux kernel's RxRPC subsystem, which he used as an entry for ZeroDay.Cloud as part of Team CCC.
Chronomaly: Tick, Tock, Root
What happens when the kernel's own timekeeping mechanisms can be turned against it? Such was the case for CVE-2025-38352 – a vulnerability in the Linux / Android kernel's POSIX CPU timers implementation that was exploited in the wild. In this talk, I'll walk through the vulnerability and dissect Chronomaly, the exploit I built for it.
Johan CarlssonBug bounty hunter
Johan Carlsson is a self-employed, full-time bug bounty hunter based in Gothenburg, Sweden. Currently ranked number one on GitLab’s bug bounty program on HackerOne, he has found and reported vulnerabilities to a host of major companies, including Zoom, Google, Apple, and GitHub. Johan holds a Bachelor’s degree in Computer Science from KTH in Stockholm, as well as a Bachelor’s degree in Fine Arts from KHiO in Oslo, Norway.
What happens if you let a security novice hack your company for five years?
Life took an unexpected turn when I left an art career to study computer science, eventually pivoting to cybersecurity and making bug bounty my full-time livelihood. Bug bounties allow anyone to use big corporations as a playground for real-world security learning. I will walk through some of my favorite findings from my years hacking GitLab, demonstrating how curiosity and persistence can allow anyone to join the field of cybersecurity.
Harri LarssonCEO and co-Founder Cparta Cyber Defense AB
Harri is a co-founder of Cparta Cyber Defense, a Swedish cybersecurity company dedicated to protecting critical infrastructure and essential industries. Founded in 2020, Cparta has grown to around 100 employees based in Stockholm.
Prior to co-founding Cparta, Harri served as Strategy Director for Defense and National Security at Hewlett Packard Enterprise and DXC Technology between 2014 and 2018, working at the intersection of technology, security, and public sector strategy.
Before entering the private sector, Harri had a distinguished career of more than 20 years in the Swedish Armed Forces. As a helicopter pilot and commander across multiple units, he reached the rank of Lieutenant Colonel, gaining extensive experience in leadership, operations, and national defense.
In addition to his professional roles, Harri is actively engaged in several initiatives aimed at developing the next generation of digital talent in Sweden. These include Midnight Sun CTF, the Swedish National Hacking Team, and “Knäck Koden”, an educational program designed to inspire and train young people aged 7 to 19 in cybersecurity and coding.
David OlgartDirector of Cybercampus Sweden
David Olgart has more than 25 years of experience in cybersecurity work as both an expert and an operational leader in the defence sector, with a background in government agencies as well as consulting. He previously coordinated the Swedish Armed Forces’ research and technology development for cyber defence. David holds an M.Sc. in Computer Science from KTH Royal Institute of Technology, specializing in data security and information systems, and serves as a Commander and Reserve Officer.
Cybercampus Sweden’s mission is to conduct groundbreaking research, innovation, and education in cybersecurity and cyber defence—beyond what individual organizations can accomplish on their own. Cybercampus is a national collaboration between universities, research institutes, government agencies, and companies, aimed at strengthening the talent pipeline for both civilian and military domains. Cybercampus addresses needs that no other actor in the cybersecurity field currently meets. Its results are intended to enhance society’s ability to manage cyber threats, strengthen Sweden’s competitiveness, and ultimately promote our economic prosperity.
Pontus JohnssonProfessor of Cybersecurity, KTH Royal Institute of Tehcnology
Pontus Johnson is a professor of cybersecurity at KTH Royal Institute of Technology in Stockholm, specializing in network architecture and cyber‑attack simulation. He directs the Center for Cyber Defense and Information Security and serves as deputy director of Cybercampus Sweden. Pontus holds an MSc from Lund and earned his PhD and Docent degrees at KTH, becoming a professor in 2009.
He has been a member of the Royal Swedish Academy of Engineering Sciences (IVA) since 2013 and joined its board as deputy chair in 2024. In 2025, he also joined the board of the Swedish Research Council.
Pontus co‑founded Foreseeti, whose attack‑simulation technology was acquired by Google in 2022; he worked part‑time at Google Cloud from 2022 to 2025. In 2025, he co‑founded Nørdsnipe, developing an AI assistant for security testing.
He has authored more than 100 scientific papers, served on numerous international program and steering committees, and was listed by Tech Awards Sweden in 2022 and 2023 as one of the 50 most influential people in Swedish tech. Pontus works 20% at Nørdsnipe and 80% within the SSAS research group at KTH.
The Calm Before the Storm Before the Calm
Generative AI is changing cybersecurity faster than most organizations are prepared for. What began as a productivity tool for writing, coding, and analysis is quickly becoming something more consequential: a force multiplier for both attackers and defenders. As AI systems improve at programming, reasoning, and autonomous task execution, they are also becoming better at discovering vulnerabilities, mapping attack paths, and accelerating offensive operations. At the same time, these same capabilities can help defenders identify weaknesses earlier, prioritize the risks that matter most, and remediate vulnerabilities at greater speed and scale.This talk explores how AI is reshaping the cyber domain, why the balance between offense and defense may shift rapidly, and what that means for security leaders, practitioners, and organizations.
Peter KlippmarkCISO at Saab
Peter Klippmark is the Chief Information Security Officer at Saab, a role he has held since early 2023, where he leads the organisation’s global Cyber security department at Group Security . With nearly two decades of experience across security leadership, risk management, and cybersecurity operations, Peter brings deep expertise to safeguarding complex, high‑assurance environments.
Before joining Saab, Peter held senior cybersecurity roles at Cambio, Nixu, Ericsson, and earlier positions within Saab itself, building a robust track record in security strategy, risk management, operational security, incident handling, and secure product development. His background spans hands on technical security, large‑scale governance frameworks, and leading high‑performing security teams.
At Midnight Sun CTF, he brings a security leader’s perspective on how modern threat landscapes and regulatory frameworks collide with real‑world resilience requirements and why talent, creativity, and adversarial thinking remain at the heart of cybersecurity.
Between Regulation and Reality: Cyber Challenges for Saab
In an era defined by accelerating geopolitical tension, Saab faces a rapidly evolving threat landscape where nation state actors, strategic competitors, and supply‑chain adversaries increasingly target defence industry capabilities. These pressures intersect with Saab’s growing use of modern technology and a complex web of technical dependencies, creating both new opportunities and new vulnerabilities.
At the same time, the regulatory environment is expanding at unprecedented speed. Requirements grow more demanding every year, yet many inherited frameworks remain rooted in a confidentiality‑first mindset that no longer reflects modern operational realities. Regulatory shifts introduce further ambiguity as organisations adapt to rules that are still maturing.
AI adds another layer of transformation. Where we stand today is a mix of promise and turbulence: AI systems are powerful but dependent on vast volumes of high‑quality data, and the need to secure that data across systems, partners, and borders has never been greater.
Against this backdrop, Saab is navigating a pivotal moment. The organisation is modernising at high velocity, adapting to new technologies, strengthening resilience across its environment, and aligning security practices to meet both current and future demands. The pace is increasing, and the ability to move fast without compromising security or trust is becoming a defining capability.
Måns SandsjöSolution Engineer, IBM
Måns started out in IBM Security, got pulled into cloud technologies, and somewhere along the way ended up as a Quantum Ambassador — which is a fancy way of saying he help companies figure out what quantum computing actually means for their business before it's too late. As a Solution Engineer, Måns works with clients every day on one of the most underestimated shifts in tech right now: becoming quantum safe. It's not science fiction anymore, and that's exactly why he and Victor are here today.
Quantum is Here. Is Your Security?
What happens when a computer solves in one minute what the most powerful supercomputer would need 10,000 years to accomplish? Imagine your worst competitor being able to simulate and optimize what takes you months — in seconds. Or worse, that a hacker can easily take over your "secure network/data" that you've spent hundreds of thousands protecting. That sounds like science fiction. It no longer is! IBM Quantum and quantum computers represent an industrial revolution that is changing the rules of the game in cybersecurity, innovation, medical technology, and more. At the same time, quantum computers introduce new challenges in the world of cryptography. In this session we will explain what IBM Quantum can actually do today, what post quantum cryptography means, and how you can position yourself correctly before it's too late. Because it's already starting to become too late.
Victor GraneSolutions Engineer, IBM
Victor Grane is a cybersecurity Solutions Engineer with over 10 years of experience in IT and security. He was introduced to cryptography during his military service more than 15 years ago, sparking a longstanding focus on secure systems and resilient cryptographic solutions. Today, Victor helps organizations modernize their technology stacks across cybersecurity, cryptography, and identity domains.
Quantum is Here. Is Your Security?
What happens when a computer solves in one minute what the most powerful supercomputer would need 10,000 years to accomplish? Imagine your worst competitor being able to simulate and optimize what takes you months — in seconds. Or worse, that a hacker can easily take over your "secure network/data" that you've spent hundreds of thousands protecting. That sounds like science fiction. It no longer is! IBM Quantum and quantum computers represent an industrial revolution that is changing the rules of the game in cybersecurity, innovation, medical technology, and more. At the same time, quantum computers introduce new challenges in the world of cryptography. In this session we will explain what IBM Quantum can actually do today, what post quantum cryptography means, and how you can position yourself correctly before it's too late. Because it's already starting to become too late.
Kristina BlomqvistActing Director Information and Cyber Security Vattenfall Group (CISO) OT Security Lead Vattenfall Group (GOTSO)
With a passion for challenges and a strong instinct for championing the underdog, it’s no surprise that Kristna Blomqvist has spent two decades in OT security. For the past seven years, Kristna has built and led OT security across the Vattenfall Group as OT Security Lead. Over the last 18 months, Kristna has also served as Vattenfall’s acting CISO, shaping group-wide information and cybersecurity strategy, governance, and support. Kristina was instrumental in the design and establishment of Energy CERT Sweden, convened key stakeholders across the sector, and continues to drive the initiative as a board member of the Energy CERT Foundation.
Beyond Collaboration: Coordinated Action for Cyber Resilience in the Energy Sector From National Strategy to Operational Security
Energy production is fundamentally local, yet it has become a prime target and leverage point in geopolitical conflict. As cyber threats intensify - from state actors, organized crime, and broad opportunistic attacks - the energy sector must stay fast and adaptable. At the same time, it must sustain long-term operations across very different IT and OT lifecycles. This talk explains why “collaboration” is not enough. We need coordinated, practical action. We must reduce noise, avoid “cry wolf” effects, and reach every part of an organization - and the sector. Using real incidents and lessons learned from the energy domain, we connect national security policy and national cyber strategies to practical measures for availability, lifecycle-aware technology choices, and value-based protection - clarifying what matters most to keep critical energy services running.
Lasse LarssonManaging Director – Energi-CERT
Lasse Larsson is responsible for building up the first sectorial CERT in Sweden focusing on the energy-sector.Through close collaboration, shared knowledge, and cutting-edge expertise, we strengthen the sector's ability to prevent and manage incidents. Our goal is a secure and stable energy supply – every day, all year round
Mr Larsson has more than 25 years of experience in industrial digital solutions and industrial automation in both the Nordics as well as in applications globally. The last 10 years he has been focusing on cybersecurity within the most critical and high demand environments such as energy, large process industries as well as the defense industry and armed forces.
Beyond Collaboration: Coordinated Action for Cyber Resilience in the Energy Sector From National Strategy to Operational Security
Energy production is fundamentally local, yet it has become a prime target and leverage point in geopolitical conflict. As cyber threats intensify - from state actors, organized crime, and broad opportunistic attacks - the energy sector must stay fast and adaptable. At the same time, it must sustain long-term operations across very different IT and OT lifecycles. This talk explains why “collaboration” is not enough. We need coordinated, practical action. We must reduce noise, avoid “cry wolf” effects, and reach every part of an organization - and the sector. Using real incidents and lessons learned from the energy domain, we connect national security policy and national cyber strategies to practical measures for availability, lifecycle-aware technology choices, and value-based protection - clarifying what matters most to keep critical energy services running.
Tobias Calås Head of Threat Intelligence and Cyber Defence, SEB
Tobias Calås is the Head of Threat Intelligence and Cyber Defence within the SEB Group. He leads a team of experts that are responsible for producing and leveraging Threat Intelligence that drive Security and Cyber Defense activities within the bank. In his roles he enables a holistic and comprehensive perspective on security, addressing emerging threats and supports robust defenses throughout SEB.
Before joining SEB, Tobias served in multiple leadership positions within the Swedish Armed Forces. His career spanned leading teams during international operations to directing long term projects in the Defense staff, continuously operating at the intersection of complex security threats and advanced technology.
Tobias holds a MSc in War Studies from the Swedish Defence University and a BA in Political Science from Uppsala University. In the Armed Forces he holds the rank of Lieutenant Colonel.
Cyber Defence in the Financial Supply Chain
In today’s threat landscape, even a near perfect security posture can’t guarantee safety since Cyber risk doesn’t stop at organizational borders. Modern businesses are tethered to a complex ecosystem of vendors, service providers, customers, and shared infrastructure, where someone else’s misfortune rapidly can become your own problem.
In this short session, SEB shares how our view of the threat landscape is shaping well informed, risk-based decisions and why engagement, not isolation, is becoming a critical security capability. We explore how security collaboration strengthens both us and our peers, and how purposeful security engagements can foster trust in business relationships while at the same time reduce collective risks.
We also examine the role of information and trust in countering fear, uncertainty, and doubt, and why blaming victims of cyber incidents is not only ineffective, but strategically harmful in a world where resilience depends on cooperation.
Susanne Öhrn Business Security Officer, SEB
Susanne Öhrn is the Business Security Officer for one of SEB’s business divisions. Working in the first line-of-defence, she supports day-to-day operations and change initiatives by supporting threat- and risk-based security decisions and engaging early in the design and assessment of new products and services, often involving third-party suppliers. Her role also includes incident handling and elements of physical and personnel security.
With 25 years in security, from hands-on work with internet-facing systems and firewalls to consulting and leadership roles in the financial sector, including Head of IT Security and Head of IT Risk & Control, she brings a holistic information and cybersecurity perspective working across business stakeholder, technical teams, suppliers and clients.
Susanne holds an MSc in Electrical Engineering from KTH Royal Institute of Technology and is certified CISSP, CISM and CRISC. She is also a Certified Information Systems Auditor (CISA).
Cyber Defence in the Financial Supply Chain
In today’s threat landscape, even a near perfect security posture can’t guarantee safety since Cyber risk doesn’t stop at organizational borders. Modern businesses are tethered to a complex ecosystem of vendors, service providers, customers, and shared infrastructure, where someone else’s misfortune rapidly can become your own problem.
In this short session, SEB shares how our view of the threat landscape is shaping well informed, risk-based decisions and why engagement, not isolation, is becoming a critical security capability. We explore how security collaboration strengthens both us and our peers, and how purposeful security engagements can foster trust in business relationships while at the same time reduce collective risks.
We also examine the role of information and trust in countering fear, uncertainty, and doubt, and why blaming victims of cyber incidents is not only ineffective, but strategically harmful in a world where resilience depends on cooperation.
Travis Goodspeed Reverse engineer, author
Travis Goodspeed is a reverse engineer of embedded systems from East Tennessee. His recent book, Microcontroller Exploits, details all the best ways to extract firmware in violation of the access control settings. He has also done some nifty projects with JTAG, mask ROM reverse engineering, and memory corruption exploits in smart cards.
How to Reverse Engineering a BLE Gizmo
A friend and I bought some Baofeng UV5R-Mini walkie talkies, to find that the wireless programming feature was only supported by an ugly phone app. In this lecture, I'll teach you how to sniff BLE traffic on an unrooted Android phone, how to read that traffic to create your own wireless client, and how to compose your own client as a desktop or phone app. We'll have some good laughs about minor bugs and XOR encryption. We'll dive into the hardware, showing what this radio might be capable of after firmware patching, and how to patch the firmware.
Alfie CG
Alfie is an iOS vulnerability researcher and exploit developer. He began hacking iOS devices at 15 years old, and is now 19 years old working as a full-time iOS researcher at Cellebrite Labs. Over the years, he has released numerous exploits, jailbreaks and other tools relating to iOS.
Trigon: Expoliting a single vulnerability across versions and architectures
Trigon is a deterministic iOS kernel exploit based on CVE-2023-32434. In this talk, we will discuss how one vulnerability can be exploited across fourteen major iOS versions (iOS 3 - 16) and three distinct chipset architectures (armv7, arm64 and arm64e). This will include exploits techniques and strategies, and look into how different devices and versions required entirely different approaches.
Michael MacaulayTeaching Fellow in the Cyber Security Centre at the University of Warwick
Michael Macaulay is a Teaching Fellow in the Cyber Security Centre at the University of Warwick, where he teaches ethical hacking, security testing, reverse engineering, malware analysis, and binary exploitation at both undergraduate and postgraduate level.
He began his career as a Computer Scientist with the UK Ministry of Defence, working on information systems research, defence technology strategy, and internet operations analysis.
Michael is concurrently a PhD candidate at the University of York, where his research applies artificial intelligence and computer vision to automated detection in critical infrastructure.
Alongside his academic work, Michael leads the Warwick Cyber competition program, supporting students at UK and international CTFs and strategy challenges.
The Disruptive Impact of Large Language Models on Capture the Flag Competitions and the Path Toward Fair Play
The Disruptive Impact of Large Language Models on Capture the Flag Competitions and the Path Toward Fair Play
Capture the Flag (CTF) competitions have long been one of cybersecurity's most effective training grounds, forging practical skills across cryptography, reverse engineering, web exploitation, and binary pwn. But the ground is shifting fast. Large language models can now solve a growing share of challenges with minimal human input, raising urgent questions about fairness, the validity of rankings, and whether participation still delivers the learning that justifies the effort.
This talk presents findings from a mixed-methods study of LLM impact on modern CTFs. Drawing on benchmarks of frontier models against public CTF datasets, case studies across jeopardy, attack–defence, and educational formats, and interviews with organisers, veteran players, and educators, we identify the challenge categories most exposed to automation and the patterns of LLM-assisted participation already visible in competitive play. Against this backdrop, we propose a safeguard framework combining tiered competition divisions, LLM-resistant challenge design, detection heuristics drawn from solve telemetry, and a draft community code of conduct.
Mikael TofvessonSenior Advisor at Cparta Cyber Defense
Mr. Mikael Tofvesson is a Senior Advisor at Cparta Cyber Defense with a focus on hybrid threats and public̶private cooperation. Mr. Tofvesson has had a distinguished career in the government sector, working mainly on national security, leading several units countering hybrid threats and conducting crisis management. Between 2022 and 2025 he served as Head of Operations, Chief of Staff and Deputy Head at the Psychological Defence Agency (MPF). From 2009 to 2021, Mr. Tofvesson developed, implemented and led operational crisis management capabilities and headed several task forces at the Swedish Civil Contingencies Agency (MSB). As Head of the Global Monitoring and Analysis Section at MSB, he was responsible for the crisis management center which included duty officers, the operational analysis function and the international operations’ field security unit. During this period, he also built and organized the Sweden’s national operational capability to identify and counter foreign malign influence. Between 1989 and 2009, Mr. Tofvesson held various positions within the Swedish Military Intelligence and Security Service.
Staffan Truvéco-founder and CTO of Recorded Future
Staffan Truvé is co-founder and CTO of Recorded Future. Previously he was CEO of the Swedish Institute of Computer Science and Interactive Institute. Staffan has co-founded more than a dozen high tech start-ups. He holds a PhD in computer science from Chalmers University of Technology and an MBA from Göteborg University. He has been a Fulbright Scholar at MIT. His research interests include artificial intelligence, information visualization, and cyber security. Staffan is a member of the Royal Swedish Academy of Engineering Sciences, and a member of the board of Chalmers University of Technology.
Keynote speaker - Automated cyber defenses
We are entering an era where cyber attackers are deploying AI to increase the speed, scale and sophistication of attacks.In this environment, defenders must automate to keep the balance of power, and think about new ways to use AI and intelligence to improve the odds. This talk will focus on the requirements for and opportunities with automated cyber defenses.