Noord InfoSec Dialogue Nordics

Scandic Continental Stockholm, Sweden

18 September 2017 - 19 September 2017

Blending the unique opportunity to network and benchmark with peers in a closed door environment the Noord InfoSec Dialogue also provides a platform to meet with the right solution partners that will drive your information security strategy forward.                                                                                                                        

Today this is more important than ever because despite predictions that cybersecurity spending will top $1 trillion for the five-year period from 2017 to 2021 it is still questionable whether this will be enough to properly equip organisations so that they can keep pace with the rapidly changing cyber security landscape.                                  

Now more than ever Chief Security officers have to ensure that their investment decisions protect them against the threats of today and arm them with the right tools for the further.  Driven by the deployment of billions of under-protected Internet of Things (IoT) devices and the more sophisticated cyber-attacks launching at businesses, governments, educational institutions, and consumers globally Information security leaders need to work hard to design the right organisational strategies.

Noord InfoSec Dialogue has become a must-attend for CISOs, directors and heads of information security. The reason is simple, true peer-to-peer engagement. Simply filling seats is not the objective. We believe in putting people with the same challenges in the same space, in a highly interactive environment, so that knowledge can be shared and practical take aways can be reached.

This private event governed by Chatham House rule will see you meet your peers and relevant solution providers. You’ll definitely make news contacts and certainly leave with some fresh perspective. 


"Excellent and interesting two days."

Head of Governance & Information SecurityCofely 

"An excellent event focussing on open dialogue with your peers."

Director, Information SecurityFidelity Information Services

"Great event. Very useful networking time. Good contact with suppliers. Great dinner."

Head of Cyber SecurityParliamentary Digital Service 

"A friendly & purposeful event, enjoyable & informative."

CISO, Unipart Group

“Great forum to meet fellow information security peers and solution providers”

Executive Director, Group Information Security Office, UBS

Past Speakers

speaker image

Alastair Barter

Senior Policy Officer


Alastair Barter – Senior Policy Officer (Business and Industry), Strategic Liaison, ICO. Alastair joined the Information Commissioner’s Office as a Senior Policy Officer in 2010. He works in the ICO’s Business and Industry Group in a policy development and liaison role covering a range of data protection issues in the areas of finance, credit, debt recovery, anti-fraud initiatives and information security.

speaker image

Angela Isom

Group Head of Data Protection Risk
JLT Insurance Group

speaker image

David Joao Vieira Carvalho

Group CISO
OCS Group


David has held a variety of roles in different companies at CISO level and other very senior roles transversally in Cyber-Security for over 16 years, most recently at OCS Group, London City Airport, CryptoHeroes, AT&T, Electronic-Arts and others.

In his most recent assignment, David is currently the Group CIhief Information Security Officer of OCS Group, he leads a large global cyber-security transformation for an environment with more the 100K employees globally.  He has led various Cyber-transformations, including one enabling the sale of a UK business for £3billion. He is also involved in the strategy around Blockchain-based technologies, machine-learning, deep-learning and disruptive innovation surrounding Offensive Cyber-Security and research on the Cyber field in regards to deep-web intelligence, zero-day defense and critical infrastructure defense.

David is very certified in his technical area having been a cyber-security researcher for most of his career. Holder of the CISSP accreditation, IFCI-500, Cyber-Forensics IFCI-CCI, CISMP. Extensive knowledge of ISO 27001:2013, PCI-DSS, GDPR, Human-Machine Interaction Security (University of Maryland), Hardware Security (University of Maryland), Cryptography (University of Maryland, Information Security and Risk Management (University of Washington), Designing and Executing Information Security Strategies (University of Washington), and Computer and Telematics Engineering Masters (University of Aveiro).

David is very passionate about start-up projects and innovation – he has been on the board of several of these through the years mostly focused of Cyber and Blockchain-based Technology and as CISO (Chief Information Security Officer).

speaker image

Jason Tunn

Detective Chief Inspector - Unit Head
Metropolitan Police Cyber Crime Unit



speaker image

Jean-Francois Simons

Brussels Airline


Jean-François Simons is currently responsible for Information Security at Brussels Airlines. He holds a degree in Applied Economics and recently achieved an Executive Master in IT Management. He has about 20 years’ experience in IT from which around 14 years in Business Intelligence, 5 years in Information Security and 2 years acting as Head of IT Customer Demand. Jean-François appreciates working on vision and strategy but always kept a high interest in understanding the underlying details. He highly values human contact and likes to work in international, multi-cultural environment.

speaker image

John Robey

Global Information Security Expert


John joined Barclays direct from University on the Graduate Programme in 1989. He spent his first 10 years with the Bank in front line customer facing roles and lending risk management. John moved into Information Security in Barclaycard in 1999. Since then he has had a number of roles working with the business and IT on initiatives ranging from Internet Payment engines to PCI DSS. His current specialist areas are securing the Cloud, Dev Ops and Agile Project methodologies. He is a strong believer in the maxim that “Security is fundamentally a people problem."

speaker image

Julian Osborne



Julian has over 20 years’ experience  working within SME and bluechip companies within the brewing, health and automotive sectors.  He has a degree in Electronic Engineering from the University of Leeds and is a member of the ISO27001/2 UK User group.

Although, currently focusing entirely on Information Security in his current role, he has a wealth of experience working in mixed environments providing consultancy to large public healthcare providers as well as  IT operations, Software design and development,  R&D, network design and implementation, and Security Architecture and Operations.

He has a particular passion and focus on supplier assurance; securing the supply chain in a diverse multi franchise environment, and on innovation and disruptive technologies.

speaker image

Mark Jones

Global CISO
Allen & Overy


A CISO and risk management and security professional operating at executive level for the last 10 years with experience of leading large teams on both a global and national basis to deliver and sustain:

- Cyber Security for globally recognised high privacy brands and tier 1 CNI providers
- Regulatory compliance programmes in response to regulatory scrutiny
- Internal and external audit support (analysis and programme delivery)
- Business and service continuity
- Information Security across all industry verticals

His experience includes leading both end user, IT service provider and management consulting teams and encompasses leadership of the global Cyber Security & IT Compliance business for Atos Group, development and deployment of the Cyber Security strategy for BAA/Heathrow Group as an end user CISO and the leadership of the Global Information Security and Cyber Security agenda as CISO for Allen and Overy.

Prior to his end user roles Mark has lead management consulting and IT service delivery teams to provide advice and IT risk solutions to a wide range of organisations including the Scottish Parliament, the Royal Navy, ABN Amro (global wholesale banking), Zurich Financial Services, VISA Europe, Resolution plc, SEGA, William Hill, Waitrose and London 2012 to name but a few.

Mark holds the honorary appointment of distinguished engineer with Fujitsu Group in recognition of his work with them concerning e-commerce and security. He also holds a degree in Computing Science, a post graduate qualification in leadership capability and is a trained security auditor.

speaker image

Mike Pitman

Head of Information Security
John Lewis


As Head of Information Security at John Lewis, Mike has accountability for information security and information assurance management and for ensuring that security plans, policies and practices reflect the changing business and regulatory environment and are in accordance with John Lewis’s risk appetite.  Mike also spent almost 3 years as Chief Information Security Officer of Adecco. Previous roles he held include Global Head of IT Security at Rentokil-Initial Plc; Head of IT Security, Risk & Compliance at Capita Life & Pensions Services.

speaker image

Nicholas Miller

Chief Information Security Officer
Brevan Howard


Nic began his career as an Intelligence Officer within the UK Government investigating nation-state cyber security actors, leading investigations into sophisticated programs targeting UK interests globally. On leaving Government, Nic moved into providing effective, risk-based security advice and leadership for private sector firms. For the last two and a half years, Nic has been employed as the CISO at Brevan Howard, a global alternative asset manager.

speaker image

Nina Barakzai

Group Head of Data Protection & Privacy
Sky UK


Nina Barakzai is immediate Past Chair of the UK’s Commerce & Industry Group, representing UK in-house counsel. She is an accountant and solicitor, Trustee for two community charities and sits on the Chartered Institute of Management Accountants’ Research Advisory Group, working on Big Data.

She served as Board Member on the International Federation of Accountants’ International Ethics Standards Board and has been appointed Vice President of In-House Counsel Worldwide.  Her professional experience is in compliance, ethics, privacy, corporate transactions, cloud services and social media.  She is Group Head of Data Protection & Privacy for the Sky UK group of companies, handling all aspects of privacy and data governance. 

speaker image

Quentyn Taylor

Director of Information Security
Canon EMEA


Quentyn Taylor is Director of Information Security for Canon Europe.

He has a wealth of experience in both the IT and information security arenas and, in recent years, has focused his attention on building business relationships across the world.

Quentyn has driven Canon’s strategy to highlight the importance of document security and help business customers to minimise their security risk. Quentyn strongly believes in educating users about the importance of a comprehensive, overall security framework that will allow Canon’s business customers to improve security in a cost-effective way.

During his career, Quentyn has worked in a variety of industries for a number of organisations including outsourced service providers, Internet service providers as well as Dotcom businesses, before moving to Canon in 2000.

speaker image

Richard Brinson


speaker image

Robert Veres

Chief Cybersecurity Strategist


Robert’s 20 years in security have involved shaping the priorities of organizations to reduce risk and create business value. He has applied this Information Security expertise to manufacturing, finance, retail and medical industries across a number of security technology and operational roles in Asia and Europe. Robert’s current role is defining and executing the strategic approach that AXA uses globally to counter cyber threats covering technical, operational and process related approaches across the 64 countries AXA operates in.

speaker image

Sharon Gould

Senior Information Security Consultant


Sharon Gould is the Security Operations Manager for the UK and European business within RSA Group (formerly Royal & SunAlliance and the home of MORE TH>N insurance). Reporting to the CISO, she manages a Horsham-based team of ten, growing to thirteen in 2017. The team punches well above its weight and has had its fair share of both challenges and successes over the past couple of years.

Sharon is an English Language & Literature graduate of Somerville College, Oxford, after which she worked for the first Data Protection Registrar (now the ICO), in Wilmslow. Sharon continued her data protection career at the RSPCA, where she was based in the CIO function and became a ‘proper IT person’, moving into technology management, and developing a keen interest in IT security.

With a career specialising in both data protection and security risk management, she also has a law degree from the Open University and is a Certified Information Security Manager. Sharon counts herself as a practical ‘doer’ and enjoys implementing and running security controls with her team, advising business colleagues on secure behaviour and working with the team to keep RSA’s customer data safe and secure.

speaker image

Simon Legg

Executive Director Information Technology
PRA Health Sciences


Simon Legg has spent the last twenty years as a business operational leader and technologist working across an array of industries including financial services, life sciences, public sector and Non-profit. During this time, he has held positions covering SVP for Infrastructure & Operations and EMEA CISO at Bank of America Merrill Lynch through to Non-Executive Director at Capital South.  Currently Simon holds the position of Executive Director at PRA Health Sciences where he is responsible for IT Risk, Information Security & Compliance. Most recently Simon has spearheaded transformational activities supporting PRA’s rapid growth seeing the company more than double in size in three years. PRA Health Sciences is a leading global contract research organization, and recently announced its new Predictivv™ platform, heralding the beginning of an entirely new approach on the role technology will play in the future of clinical development. Simon considers himself a business operations pragmatist with practical experience won through successful leadership across more than a dozen multi-million-dollar M&A events and the technology frontline view point of the magic technologists have to bring to the table during significant business change and crisis.

speaker image

Tarun Samtani

Group Chief Information Security Officer
Findel Plc


Tarun Samtani,CISSP is the Group Cyber Security Advisor for Findel Plc, Express-Gifts (multi-channel retailer) and Findel Education. Tarun holds over 17+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling & Retail. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. 

He has a wealth of experience in Cyber Security and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes. 

He has a passion for Cyber Security and enjoys sharing his experience. He also has a keen interest in helping out charities and non-profit board organisations fight cybercrime. His specialisations include strategy, planning through delivery of security programmes including Security Culture, Data Security and DLP & IAM programmes, 

He regularly addresses global audience on these and other topics. 

speaker image

Vincent Di Giambattista

CISO / Director Information Security and IT Compliance
Walgreens Boots Alliance


The Programme is currently being researched. If you would like to offer your expertise and help us shape the agenda please don't hesitate to get in touch by contacting Layla.Sienne, Event Director

If you are interested in becoming a solution partner, please send an e-mail to Chris Hugall at


Current Partners


BlackBerry secures, connects and mobilizes the enterprise. To manage today’s enterprise of things, BlackBerry provides a software platform that enables and manages security, mobility and communications between and among hardware devices, programs, mobile apps and the internet of things. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ.


Bomgar connects people and technology securely, providing leading privileged access management and remote support solutions that strengthen security while increasing productivity. Bomgar solutions help support and security professionals improve business performance by enabling secure, controlled access to any device or system, anywhere in the world.



FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,000 customers across 67 countries, including more than 650 of the Forbes Global 2000.


Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organisations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements. With Infoblox, organisations can protect against the rising flood of malware and cyberattacks that target networks; overcome complexity by creating a single point of control across traditional data centres as well as public and private cloud deployments; establish a single point of enforcement for security and compliance policies; and deliver actionable insights for making networks more reliable, efficient, and effective. Infoblox is headquartered in Santa Clara, California, and has operations in over 25 countries.

Juniper Networks

Juniper Networks enables its customers true advantage over their competition, whether that’s bringing new, revenue-generating services to market in minutes instead of months, reducing network costs, or providing security and protection for their most valuable assets. Juniper’s routing, switching, security, SDN, NFV and other software solutions can be used to meet your networking requirements in the following areas:

  • Data Center: all of the networking components for a Data Center from a few racks to the largest in the world
  • Wide Area Network: routing and security for all size sizes from a single branch to a high speed core network
  • Campus & branch: build a secure and reliable network right out to your employee
  • Security: moving beyond a perimeter based approach to a software defined secure network

The world’s biggest financial services organizations, wired and wireless service providers, cloud and data center providers run on Juniper Networks.

Why Juniper Networks? Quite simply, because we provide the kind of innovative thinking, performance, automation and commitment that enable the world’s best networks. If your business depends on the network to deliver mission-critical transactions, applications, and services, you do business with Juniper Networks. Now more than ever, the world relies on secure, high-performance networks that can scale to meet ever-changing business demands. And now more than ever, the world needs network innovation to unleash our full potential


Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing  complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence. Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, Netskope has been named to CIO Magazine's top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at and follow us on Twitter @Netskope.

The Netskope Cloud Confidence Index is a database of more than 5,000 cloud apps that Netskope has evaluated based on 35+ objective criteria adapted from Cloud Security Alliance guidance. These criteria indicate apps' enterprise-readiness, taking into consideration security, auditability, and business continuity. Each app is assigned a score of 0-100 and placed into one of five Cloud Confidence Levels - excellent, high, medium, low or poor. Netskope customers can use the Cloud Confidence Index score to make cloud app selection decisions, create custom criteria weightings in accordance with their business policies (e.g., weigh encryption of data at rest more heavily in the score), and enforce real-time policies based on Level (e.g., "Don't let users share content in cloud storage apps rated medium or below").

Skyhigh Networks

Skyhigh Networks helps organisations safely adopt cloud services while meeting security, compliance and governance requirements. Over 400 enterprises including BP, Astra-Zeneca, The Prudential and Swarovski gain visibility into all cloud services in use and their associated risk; analyse cloud usage to identify security breaches, compromised accounts and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control and activity monitoring for sanctioned cloud services such as Office 365,, Box & Google Drive

Business connections: a strong catalyst for success!

At the Noord Group, we understand the power of face-to-face interactions and their ability to inspire, drive change and do better business.

With this in mind, we individually approach all of our delegates to fully understand their expectations and participation goals. Based on the information collected, our dedicated business matching team devises a personalised itinerary featuring a variety of powerful business interactions such as:

  • One-to-one meetings with our Solution Partners so as to be introduced to the products and services most relevant to energise business growth
  • Quality interactions with other delegates during the frequent time-slots dedicated to participant networking

The event will also provide ample opportunities to mingle with peers in a casual set-up, including during:

  • Coffee breaks
  • Gala dinner
  • Luncheons

These relaxed, informal and interactive networking sessions will guarantee that you make enduring and mutually beneficial connections which will help you expand your network of contacts as well as your sphere of influence.

Ultimately, it is all about making you and your business thrive.