SPEAKERS 2025
This is a comprehensive overview of all speakers at V2 Security Aarhus.
The list of speakers will be updated continuously.
We look forward to welcoming you to two days filled with learning, reflection, and inspiration!

Clémence Poirier
Senior Cyberdefense Researcher
CENTER FOR SECURITY STUDIES AT ETH ZURICH
Hacking the Cosmos: Cyber operations against the space sector
Senior Cyberdefense Researcher
CENTER FOR SECURITY STUDIES AT ETH ZURICH
Hacking the Cosmos: Cyber operations against the space sector

Morten Duus
Senior Vice President / Group CISO
Vestas Wind Systems
Fremtidens energisystem under cyberangreb og geopolitisk pres
Senior Vice President / Group CISO
Vestas Wind Systems
Fremtidens energisystem under cyberangreb og geopolitisk pres

Anders Riis
Vice President, Communications
Vestas
Fremtidens energisystem under cyberangreb og geopolitisk pres
Vice President, Communications
Vestas
Fremtidens energisystem under cyberangreb og geopolitisk pres


Linda Liang
Research Associate
Heidelberg University
The SolarWinds attack and its political implications: Keeping track of major cyber incidents and how states respond.
Research Associate
Heidelberg University
The SolarWinds attack and its political implications: Keeping track of major cyber incidents and how states respond.


Rune Espensen
Head of Information Security Office
Nordea
Trusselsbilledet for en Nordisk bank med afsæt i aktuelt DDoS angreb
Head of Information Security Office
Nordea
Trusselsbilledet for en Nordisk bank med afsæt i aktuelt DDoS angreb


Michael Barnhart
DPRK Operations - Strategic Intelligence and Government
Mandiant - Google
Inside the DPRK's IT Worker Operations and Global APT Ambitions
DPRK Operations - Strategic Intelligence and Government
Mandiant - Google
Inside the DPRK's IT Worker Operations and Global APT Ambitions

Lone Juric Sørensen
Chef for Fælles IT og Digitalisering
Aarhus Kommune
Debat | Kommunernes NIS2-hovedpine: Hvorfor kommer de ikke bare i gang?
Chef for Fælles IT og Digitalisering
Aarhus Kommune
Debat | Kommunernes NIS2-hovedpine: Hvorfor kommer de ikke bare i gang?

Henrik Tang Brix
It- og digitaliseringschef
KITA (de kommunale it-chefer) (Favrskov Kommune)
Debat | Afhængighed af tech-giganter og sårbarhed for kritisk digital infrastruktur
It- og digitaliseringschef
KITA (de kommunale it-chefer) (Favrskov Kommune)
Debat | Afhængighed af tech-giganter og sårbarhed for kritisk digital infrastruktur

Rasmus Knappe
Teknologi- og Sikkerhedsdirektør
Microsoft
Debat | Afhængighed af tech-giganter og sårbarhed for kritisk digital infrastruktur
Teknologi- og Sikkerhedsdirektør
Microsoft
Debat | Afhængighed af tech-giganter og sårbarhed for kritisk digital infrastruktur



Michael Sjøberg
Hostage & Ransomware Negotiator
Delta Crisis Management
Negotiating Ransomware - med gidselforhandler Michael Sjøberg
Hostage & Ransomware Negotiator
Delta Crisis Management
Negotiating Ransomware - med gidselforhandler Michael Sjøberg

Mille Østerlund
Chef for Cyberservices
KOMBIT
Debat | Kommunernes NIS2-hovedpine: Hvorfor kommer de ikke bare i gang?
Chef for Cyberservices
KOMBIT
Debat | Kommunernes NIS2-hovedpine: Hvorfor kommer de ikke bare i gang?

Ron Gilad
Manager, Product Management
Akamai Technologies
From Chaos to Calm: Navigating Emerging API Security Challenges
Manager, Product Management
Akamai Technologies
From Chaos to Calm: Navigating Emerging API Security Challenges

Duncan McIntyre
Senior Solutions Engineer
Snyk
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code
Senior Solutions Engineer
Snyk
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code

Martin Hald Nissen
Sr. Director, Head of Cloud Security and Threat Intelligence
TDC Erhverv
Hvordan sikrer du din virksomhed mod fejlkonfigurationer?
Sr. Director, Head of Cloud Security and Threat Intelligence
TDC Erhverv
Hvordan sikrer du din virksomhed mod fejlkonfigurationer?

Thomas Sindal Schmidt
Cybersecurity Architect
TDC Erhverv
Hvordan sikrer du din virksomhed mod fejlkonfigurationer?
Cybersecurity Architect
TDC Erhverv
Hvordan sikrer du din virksomhed mod fejlkonfigurationer?



