AGENDA 2026
May 5th, 2026
Starting 8AM CET - Stockholm, Oslo, Copenhagen Time
Starting 9AM EEST - Helsinki Time
​
​
8.30 (EEST)
WE OPEN THE DOORS & WELCOME
​
9.00
OPENING REMARKS BY OUR MODERATOR
Jesse Kamras
​​
​
9.10
KEYNOTE
Europe’s Defence Single Market: A Pillar of Security and Resilience
Paraskevi Papantoniou, Head of Unit - Defence Single Market and Hybrid Threats, European Commission, Directorate General for Defence Industry & Space
-
Why the defence single market matters for Europe’s security in an unstable world
-
Linking industrial competitiveness, resilience, and hybrid threat preparedness
-
The evolving role of EU-level coordination in defence and security
-
Implications for industry leaders and decision-makers
​
​​​
9.45
Critical Infrastructure and Resilience
TBA
-
How to protect energy, logistics and data networks from hybrid and physical threats
-
Situational awareness powered by AI and real-time response
-
What role could fusion energy and emerging technologies play in future supply security?
​
10.10
NETWORKING BREAK
​​
10.45
KEYNOTE
Dual-Use Technologies as a Pillar of National Security
Tero Vauraste, MSc Lt Cdr (Ret), Chair Kelluu, Senior Advisor Kuva Space
-
How Finnish civilian tech companies can deliver critical solutions for defence and security
-
Aligning civil and military use: funding, and ownership models with a European focus
-
Real-world examples of successful commercialization
​​​
​​​​​​​
11:10
From Multi‑Domain Operations to Rapid Capability Adoption: Building Trust, Speed and Interoperability through Connectivity
Tero Maaniemi, Manager, Defence Interoperability Architecture, Telia Company
-
Multi‑Domain Operations as the new operational baseline: How modern security challenges span military, civilian, industrial and digital domains, and why capability development must reflect this reality
-
Speed as a strategic capability under NATO RAAP: Why rapid adoption, interoperability and early validation are now decisive factors for operational relevance and deterrence
-
NATO Innovation Range as an execution environment: How Innovation Ranges translate policy into practice by enabling realistic, multi‑domain testing and integration of dual‑use technologies​
-
Early‑phase cooperation between defence, industry and research: The importance of joint problem framing, early experimentation and technical validation before formal procurement and deployment
-
Trusted connectivity as a foundational enabler: The role of secure, resilient operator‑scale communications in enabling cross‑domain integration, resilience and operational readiness across the security sector
​
11.35
LUNCH & NETWORKING BREAK
12.35
KEYNOTE
Strategic Approach to International Business in Regulated Environment
Lauri Ignatius, Associate General Counsel, ICEYE
Johanna Tuohino, Senior Attorney, Dittmar & Indrenius
-
Case study: Strategic navigation in the space law context
-
Legal function as strategic partner – driving business value and managing risks
-
Key regulatory trends on the horizon
​​​​
​
13.00
The Convergence of the Physical and Cyber Domains – A New Reality for Defense and Critical Infrastructure
Janne Pirttilahti, Chief Technology Officer, Loihde
-
The changing security landscape – physical and digital security form a single entity
-
The interface between physical and cybersecurity
-
Specific challenges for critical infrastructure
-
The architecture of comprehensive security and situational awareness
​​​​​​​​​
13.25
NETWORKING BREAK
​
14.00
KEYNOTE
Hybrid Threats and the Age of Information Warfare
Janis Sarts, CEO, NATO Strategic Communications Centre of Excellence
-
AI-generated disinformation and influence operations – where is the next frontier?
-
Technologies, partnerships and legislation supporting defence
-
A shared line of defence: how media, authorities and citizens build information resilience together
​​
14.25
KEYNOTE
The New Great Game: Power Politics in a Networked Age
Michael Beckley, Professor of Political Science at Tufts University, Senior Fellow at American Enterprise Institute and Expert on U.S.–China Strategy (USA)
How control of critical networks is reshaping global security
-
Great-power competition is shifting from territorial control to dominance over the networks that move goods, data, energy, and capital
-
Authoritarian states are forming a “networked Heartland” by asserting control over supply chains, critical minerals, and digital infrastructure
-
In response, the West is building a distributed “Rimland” strategy, linking defense production, cyber capabilities, energy resilience, and industrial strength
-
This session outlines a new strategic architecture that fuses military and economic security and the pivotal role defense and technology leaders will play
-
A forward-looking analysis of how control over critical systems will define power in the decades to come - and what must be done to stay ahead
​​​
​​​
15.00
END REMARKS BY OUR MODERATOR
Jesse Kamras
​
15.05
NETWORKING
​
16.00
END OF DAY