
Brandon Valeriano
Senior Distinguished Fellow
Marine Corps University
KEYNOTE | The New U.S. Cybersecurity Strategy – What’s in it for Denmark
Senior Distinguished Fellow
Marine Corps University
KEYNOTE | The New U.S. Cybersecurity Strategy – What’s in it for Denmark

Daniel Aldstam
Chief Security Officer
GlobalConnect Group
KEYNOTE | How to protect critical digital infrastructure
Chief Security Officer
GlobalConnect Group
KEYNOTE | How to protect critical digital infrastructure

Emil Bisgaard
Partner, Erhvervsjuridisk Rådgiver
Poul Schmith/Kammeradvokaten
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?
KEYNOTE: NIS2: Nedtællingen er begyndt
Partner, Erhvervsjuridisk Rådgiver
Poul Schmith/Kammeradvokaten
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?
KEYNOTE: NIS2: Nedtællingen er begyndt

Jakob Bindl
Policy Officer
Federal Commissioner for Data Protection and Freedom of Information
KEYNOTE | Looking into Microsoft: Why Office 365 is a no go for public bodies
Policy Officer
Federal Commissioner for Data Protection and Freedom of Information
KEYNOTE | Looking into Microsoft: Why Office 365 is a no go for public bodies

Marie Bjerre
Digitaliseringsminister og minister for ligestilling
Venstre
ÅBNINGSTALE | Danmarks cybersikkerhed set fra Christiansborg
Digitaliseringsminister og minister for ligestilling
Venstre
ÅBNINGSTALE | Danmarks cybersikkerhed set fra Christiansborg



Ole Fisker
Senior Security Tech Advisor
Sundhedsdatastyrelsen
KEYNOTE | Danske sundhedsdata er guld værd – tænk som en hacker når du beskytter dem.
Senior Security Tech Advisor
Sundhedsdatastyrelsen
KEYNOTE | Danske sundhedsdata er guld værd – tænk som en hacker når du beskytter dem.


Rik Ferguson
VP Threat Intelligence
Forescout Technologies
KEYNOTE | There’s Nothing Artifical About Intelligence
VP Threat Intelligence
Forescout Technologies
KEYNOTE | There’s Nothing Artifical About Intelligence

Søren Bank Greenfield
Afdelingschef
Sundhedsdatastyrelsen
KEYNOTE | Danske sundhedsdata er guld værd – tænk som en hacker når du beskytter dem.
Afdelingschef
Sundhedsdatastyrelsen
KEYNOTE | Danske sundhedsdata er guld værd – tænk som en hacker når du beskytter dem.

Stefan Soesanto
Senior Cyber Defense Researcher
Center For Security Studies, ETH Zurich
KEYNOTE | Digital Warfighting in Ukraine: Volunteers, Applications, and uncomfortable questions
Senior Cyber Defense Researcher
Center For Security Studies, ETH Zurich
KEYNOTE | Digital Warfighting in Ukraine: Volunteers, Applications, and uncomfortable questions

Ana Vallés
European Cybers Security Organisation
Regional Policy Manager
Cyber Security Made in Europe by DigitalLead & ECSO
European Cybers Security Organisation
Regional Policy Manager
Cyber Security Made in Europe by DigitalLead & ECSO


Christian von Stamm Jonasson
Dansk Erhverv
Chefkonsulent
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?
Dansk Erhverv
Chefkonsulent
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?





Jakob Bring Truelsen
DK Hostmaster A/S
Administrerende direktør
Værktøjer og teknologier: Sådan beskytter du din virksomheds domæne mod hackere
DK Hostmaster A/S
Administrerende direktør
Værktøjer og teknologier: Sådan beskytter du din virksomheds domæne mod hackere

Jan Trzaskowski
Copenhagen Business School
Professor, Ph.D.
Hvorfor skal du være bekymret for dit privatliv?
Copenhagen Business School
Professor, Ph.D.
Hvorfor skal du være bekymret for dit privatliv?

Jan Kaastrup
CSIS Security Group
CIO
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?
CSIS Security Group
CIO
NIS2 rammer danske virksomheder: Hvilken udfordring står vi overfor?

Jeppe T. Jacobsen
Forsvarsakdemiets Institut for Militær Teknologi
Adjunkt
Cybertruslen i lyset af Ukrainekrigen
Forsvarsakdemiets Institut for Militær Teknologi
Adjunkt
Cybertruslen i lyset af Ukrainekrigen


Kasia Torian
Danmarks DPO-Foreningen
Formand for Danmarks DPO-Foreningen og Advokat
Få styr på DPO-rollen
Danmarks DPO-Foreningen
Formand for Danmarks DPO-Foreningen og Advokat
Få styr på DPO-rollen


Lasse Kronborg
Forsvarsakdemiets Institut for Militær Teknologi
Major
Cybertruslen i lyset af Ukrainekrigen
Forsvarsakdemiets Institut for Militær Teknologi
Major
Cybertruslen i lyset af Ukrainekrigen

Marc Schack
Forsvarsakdemiets Institut for Militær Teknologi
Lektor
Cybertruslen i lyset af Ukrainekrigen
Forsvarsakdemiets Institut for Militær Teknologi
Lektor
Cybertruslen i lyset af Ukrainekrigen

Mark Fiedel
Center for Cybersikkerhed
Chef for cyberanalyse
Cybertruslen mod Danmark: Et indblik i det aktuelle trusselsbillede og arbejdet for at ruste danske netværk og systemer mod cybertruslen
Center for Cybersikkerhed
Chef for cyberanalyse
Cybertruslen mod Danmark: Et indblik i det aktuelle trusselsbillede og arbejdet for at ruste danske netværk og systemer mod cybertruslen

Martin Christensen
Orange Cyberdefence
Penetration tester
Tænk som en hacker – regler er til for at blive brudt
Orange Cyberdefence
Penetration tester
Tænk som en hacker – regler er til for at blive brudt


Mikael Jensen
D-mærket/D-Seal
Direktør
D-mærket hjælper virksomheder når EU strammer reglerne for cybersikkerhed
D-mærket/D-Seal
Direktør
D-mærket hjælper virksomheder når EU strammer reglerne for cybersikkerhed


Sofie Jensen
Center for Defence, Space & Security (CenSec)
COO
Cyber Security Made in Europe by DigitalLead & ECSO
Center for Defence, Space & Security (CenSec)
COO
Cyber Security Made in Europe by DigitalLead & ECSO

Adam Boynton
Jamf
Senior Security Sales Manager
How to build a secure Apple experience that users will love.
Jamf
Senior Security Sales Manager
How to build a secure Apple experience that users will love.

Alexander Mazikin
CSIS Security Group
Product Owner, Threat Intelligence
Strengthen Managed Detection and Response practices with internal Threat Intelligence capabilities
CSIS Security Group
Product Owner, Threat Intelligence
Strengthen Managed Detection and Response practices with internal Threat Intelligence capabilities

Amit Sharma
Synopsys
Sales Engineer
How to defend yourself Against Malicious Code in Open Source Software
Synopsys
Sales Engineer
How to defend yourself Against Malicious Code in Open Source Software


Ana Vallés
European Cybers Security Organisation
Regional Policy Manager
Cyber Security Made in Europe by DigitalLead & ECSO
European Cybers Security Organisation
Regional Policy Manager
Cyber Security Made in Europe by DigitalLead & ECSO

Andras Stefler
Itavis
Senior Architect & Security Officer
Hybrid cybersecurity: Secure across on-premise and cloud
Itavis
Senior Architect & Security Officer
Hybrid cybersecurity: Secure across on-premise and cloud


Andrew Michal
KMD
GRC and Technical Security Adviser
Hvordan forbereder man sig på, at kvantecomputere vil kunne bryde de mest gængse krypteringer?
KMD
GRC and Technical Security Adviser
Hvordan forbereder man sig på, at kvantecomputere vil kunne bryde de mest gængse krypteringer?




Carina Lucas-Sennenwaldt
Børns Vilkår
GDPR-ansvarlig
Datatilsynet på besøg hos Børns Vilkår – hør hvad der skete!
Børns Vilkår
GDPR-ansvarlig
Datatilsynet på besøg hos Børns Vilkår – hør hvad der skete!


Christoffer Callender
Broadcom Software
Regional CTO
"Follow-the-user" Cloud Security
"Follow-the-user" Cloud Security
Broadcom Software
Regional CTO
"Follow-the-user" Cloud Security
"Follow-the-user" Cloud Security


Dan Vasile
BlueVoyant
Vice President - Strategic Cyber Advisory
A CISO Perspective - The Convergence of Internal and External Cyber Defence
BlueVoyant
Vice President - Strategic Cyber Advisory
A CISO Perspective - The Convergence of Internal and External Cyber Defence

Dan Wolff
HCL Software
Director of Products, HCL BigFix
Practical Attack Surface Reduction Before the Attack: from Application to Endpoint
HCL Software
Director of Products, HCL BigFix
Practical Attack Surface Reduction Before the Attack: from Application to Endpoint

David Thejl-Clayton
Elastic
Senior Solution Architect
Want to know the best source of cyber threat intelligence?… Shhh, it’s your own data!
Elastic
Senior Solution Architect
Want to know the best source of cyber threat intelligence?… Shhh, it’s your own data!

Ebbe B. Petersen
NNIT
Director Cybersecurity & Compliance
Zero Trust in OT Security: Safeguard your critical infrastructure from modern cyber threats
NNIT
Director Cybersecurity & Compliance
Zero Trust in OT Security: Safeguard your critical infrastructure from modern cyber threats

Edy Almer
Logpoint
Senior Product Manager
Maximizing SOC Efficiency with ChatGPT: Harnessing the Power of Large Language Models
Logpoint
Senior Product Manager
Maximizing SOC Efficiency with ChatGPT: Harnessing the Power of Large Language Models


Filip Verloy
Noname Security
EMEA Technical Evangelist
APIs: Gateway to Digital Transformation, or hidden attack surface?
Noname Security
EMEA Technical Evangelist
APIs: Gateway to Digital Transformation, or hidden attack surface?

Greg Jones
Kaseya
Vice President of Business Development in EMEA
Maximizing MSP Efficiency: Driving Business Results with Security and Integration
Kaseya
Vice President of Business Development in EMEA
Maximizing MSP Efficiency: Driving Business Results with Security and Integration


Hans Rotteveel
Accenture
Security Consulting Senior Manager
Transforming with Confidence: Integrating Cybersecurity into SAP S/4 Digital Transformations
Accenture
Security Consulting Senior Manager
Transforming with Confidence: Integrating Cybersecurity into SAP S/4 Digital Transformations

Hans Jayatissa
KMD A/S
Digitaliseringsdirektør
Hvordan forbereder man sig på, at kvantecomputere vil kunne bryde de mest gængse krypteringer?
KMD A/S
Digitaliseringsdirektør
Hvordan forbereder man sig på, at kvantecomputere vil kunne bryde de mest gængse krypteringer?


Henrik Mønster
Atea
Lead Cloud Solution Architect
Ramt af ransomware? Sådan hjælper VMware dig med at rense og gendanne dine applikationer.
Atea
Lead Cloud Solution Architect
Ramt af ransomware? Sådan hjælper VMware dig med at rense og gendanne dine applikationer.

Inge Wetzer
Bureau Veritas
Principal Psychologist Cybersecurity & Compliance
From awareness to behavior: A psychological perspective on the human factor in cybersecurity
Bureau Veritas
Principal Psychologist Cybersecurity & Compliance
From awareness to behavior: A psychological perspective on the human factor in cybersecurity



Jakob Krabbe Sørensen
Complycloud
Assistant attorney-at-law
Datatilsynet på besøg hos Børns Vilkår – hør hvad der skete!
Complycloud
Assistant attorney-at-law
Datatilsynet på besøg hos Børns Vilkår – hør hvad der skete!




Janus Platen
Telenor
Head of Near Core Products
Sådan styrker du sikkerhedsadfærd i din virksomhed: Fra tabu til kultur
Telenor
Head of Near Core Products
Sådan styrker du sikkerhedsadfærd i din virksomhed: Fra tabu til kultur






Johan Bendixen
Itavis
Head of Strategy & Porduct Development
Pragmatisk risikostyring: Skab bro mellem IT og ledelse når der skal investeres i cybersikkerhed
Itavis
Head of Strategy & Porduct Development
Pragmatisk risikostyring: Skab bro mellem IT og ledelse når der skal investeres i cybersikkerhed

Jonas Markström
Yubico
Senior Solutions Engineer
The biggest threat to Identity and what you can do about it right now
Yubico
Senior Solutions Engineer
The biggest threat to Identity and what you can do about it right now




Kåre Appel Weng
DNV Business Assurance Denmark A/S
Sales Manager
Why ISO 27001 is the answer to the questions you might not even ask yet
DNV Business Assurance Denmark A/S
Sales Manager
Why ISO 27001 is the answer to the questions you might not even ask yet


Kenneth Thorsted
Wingmen Solutions
Security Advisor
Basal sikkerhedshygiejne er stadig vigtigst i 2023 - 5 gevinster ved basal sikkerhedshygiejne
Wingmen Solutions
Security Advisor
Basal sikkerhedshygiejne er stadig vigtigst i 2023 - 5 gevinster ved basal sikkerhedshygiejne



Kirsten Hede
Bestyrelsesforeningens Center for Cyberkompetencer & CBS-Bestyrelsesuddannelserne (Offentlige Selskaber)
Projektdirektør
Exclusive C-level event
Bestyrelsesforeningens Center for Cyberkompetencer & CBS-Bestyrelsesuddannelserne (Offentlige Selskaber)
Projektdirektør
Exclusive C-level event

Konstantinos Kiourtsis
Sonatype
Team Lead Sales Engineering - Partners
The Evolution of Software Supply Chain Attacks
Sonatype
Team Lead Sales Engineering - Partners
The Evolution of Software Supply Chain Attacks






Martin Plesner-Jakobsen
Veeam Software
Senior Systems Engineer
Sådan kommer du dig over et cyberangreb - hurtigt og billigt!
Veeam Software
Senior Systems Engineer
Sådan kommer du dig over et cyberangreb - hurtigt og billigt!

Martin Juhl Prendergast
Miracle A/S
Linux Architect
Containersikkerhed - The average, the bad and the really ugly
Miracle A/S
Linux Architect
Containersikkerhed - The average, the bad and the really ugly


Martin Jakobsen
Capmon A/S
Non Executive CTO
Oplev ransomeware indefra ... inklusiv patenteret roll back funktion
Capmon A/S
Non Executive CTO
Oplev ransomeware indefra ... inklusiv patenteret roll back funktion

Matthew Thomas Clark
Lytzen IT
Chief Technical Director, CCIE and Partner at Lytzen IT
If you have invested in Cisco and security is on your agenda, you need to come and meet me
Lytzen IT
Chief Technical Director, CCIE and Partner at Lytzen IT
If you have invested in Cisco and security is on your agenda, you need to come and meet me

Max Wijnbladh
Google
Partner Engineer
Challenging the rules of security
Challenging the rules of security
Partner Engineer
Challenging the rules of security
Challenging the rules of security



Mikkel Planck
CrowdStrike
Senior Cybersecurity Specialist
’State of the art’-sikkerhed er mere end bare værktøjer
CrowdStrike
Senior Cybersecurity Specialist
’State of the art’-sikkerhed er mere end bare værktøjer


Morten Rosted Vang
Dansk Industri - DI Digital
Fagleder, Digital ansvarlighed og cybersikkerhed
Cybersikkerhed anno 2023 – not just NIS 2 have.
Dansk Industri - DI Digital
Fagleder, Digital ansvarlighed og cybersikkerhed
Cybersikkerhed anno 2023 – not just NIS 2 have.





Peter Mohr
Conscia
Senior Mobility Evangelist
Beskyt jeres mobile enheder. Hvad er de 8 vigtigste ting, I skal gøre?
Conscia
Senior Mobility Evangelist
Beskyt jeres mobile enheder. Hvad er de 8 vigtigste ting, I skal gøre?

Peter Sandkuijl
Check Point Software Technologies
EMEA Vice President of Security Engineering
Achieving cloud security with confidence across clouds
Check Point Software Technologies
EMEA Vice President of Security Engineering
Achieving cloud security with confidence across clouds

Petr Hnevkovsky
OpenText Cybersecurity
Chief Cyber Security Strategist
NIS2: Get ready, get compliant, ultimately get resilient now
OpenText Cybersecurity
Chief Cyber Security Strategist
NIS2: Get ready, get compliant, ultimately get resilient now


Philip Falk
WatchGuard Technologies
Business Development Director, Denmark
Discover the power of XDR to enhance your security posture
WatchGuard Technologies
Business Development Director, Denmark
Discover the power of XDR to enhance your security posture

Richard Meeus
Akamai
Security Technology and Strategy Director
Future-Proofing your Business Resilience Strategy to Combat Inevitable Cyber Breaches
Akamai
Security Technology and Strategy Director
Future-Proofing your Business Resilience Strategy to Combat Inevitable Cyber Breaches

Rik Ferguson
Forescout Technologies
VP Threat Intelligence
KEYNOTE | There’s Nothing Artifical About Intelligence
Forescout Technologies
VP Threat Intelligence
KEYNOTE | There’s Nothing Artifical About Intelligence


Ronald Den Braven
Fortinet
Director, Product Marketing
Threat intelligence and sharing and why its so important today and in the future
Fortinet
Director, Product Marketing
Threat intelligence and sharing and why its so important today and in the future

Sia Møller
DSV A/S
Senior IT Security Specialist
Basal sikkerhedshygiejne er stadig vigtigst i 2023 - 5 gevinster ved basal sikkerhedshygiejne
DSV A/S
Senior IT Security Specialist
Basal sikkerhedshygiejne er stadig vigtigst i 2023 - 5 gevinster ved basal sikkerhedshygiejne

Sidsel Klæstrup Borup
ICY Security
Finance- & Compliance Manager
Hvordan kan brugerstyring bidrage til at fremme og understøtte NIS2 compliance?
ICY Security
Finance- & Compliance Manager
Hvordan kan brugerstyring bidrage til at fremme og understøtte NIS2 compliance?

soeren Christiansen
Entrust
Sr. Technical Sales Consultant
Få Fuld kontrol over dine Cloud miljøer og øg sikkerheden
Entrust
Sr. Technical Sales Consultant
Få Fuld kontrol over dine Cloud miljøer og øg sikkerheden

Sofie Jensen
Center for Defence, Space & Security (CenSec)
COO
Cyber Security Made in Europe by DigitalLead & ECSO
Center for Defence, Space & Security (CenSec)
COO
Cyber Security Made in Europe by DigitalLead & ECSO

Søren Linde
Conscia
Senior Mobility Consultant
Beskyt jeres mobile enheder. Hvad er de 8 vigtigste ting, I skal gøre?
Conscia
Senior Mobility Consultant
Beskyt jeres mobile enheder. Hvad er de 8 vigtigste ting, I skal gøre?

Søren Høeberg Holm
Sentinel One
Nordic Sales Director
XDR - Automate your Security to defeat future challenges
Sentinel One
Nordic Sales Director
XDR - Automate your Security to defeat future challenges

Staffan Olsen
Extrahop
Senior Security Sales Engineer Nordics
Turning Level 1 Analysts into Threat Hunters
Extrahop
Senior Security Sales Engineer Nordics
Turning Level 1 Analysts into Threat Hunters

Steffen Friis
VIPRE Security Group
Sales Engineer
How not to become Headline News: The Cyber Security Edition
Vigtigheden af cybersikkerhed og bekæmp trusler effektivt
VIPRE Security Group
Sales Engineer
How not to become Headline News: The Cyber Security Edition
Vigtigheden af cybersikkerhed og bekæmp trusler effektivt

Steven Wood
OpenText Cybersecurity
Director, Solutions Consulting
Eliminating Blind spots in Cybersecurity Shield
OpenText Cybersecurity
Director, Solutions Consulting
Eliminating Blind spots in Cybersecurity Shield

Stevie Coates
GRAYSHIFT, LLC
DFS International Manager
The Benefits of Full File System Extractions From Mobile Devices & Real Time Analysis
GRAYSHIFT, LLC
DFS International Manager
The Benefits of Full File System Extractions From Mobile Devices & Real Time Analysis


Tom Madsen
NNIT
Cybersecurity Subject Matter Expert
Zero Trust in OT Security: Safeguard your critical infrastructure from modern cyber threats
NNIT
Cybersecurity Subject Matter Expert
Zero Trust in OT Security: Safeguard your critical infrastructure from modern cyber threats



Torben Clemmensen
TEHTRIS
IT Security Speciallist
Den Europæiske XDR-løsning – komponeret af fransk efterretningsofficer & Ethical Hacker
TEHTRIS
IT Security Speciallist
Den Europæiske XDR-løsning – komponeret af fransk efterretningsofficer & Ethical Hacker

Tudor James
QOMPLX, Inc.
EMEA Head of Security Engineering
Assume Breach: Layering Prevention and Detection for Comprehensive Identity Security
QOMPLX, Inc.
EMEA Head of Security Engineering
Assume Breach: Layering Prevention and Detection for Comprehensive Identity Security

Ulrich Rysgaard
ColorTokens
Senior Strategic Security Advisor
How not to fail at your Zero Trust initiatives
ColorTokens
Senior Strategic Security Advisor
How not to fail at your Zero Trust initiatives