TOPIC | Governance & Compliance

Businesses are increasingly required to protect their data, and this demands much more than just technical IT security.

Legislation such as GDPR and the new NIS2 Directive, combined with record-high pressure from cybercriminals, has significantly raised the requirements for internal information security. Maintaining the necessary level of expertise to meet these demands is both resource-intensive and challenging.

Gain practical tools and best practices that will help your business navigate the new legislation and minimize the risk of your data falling into the wrong hands.

Wednesday, May 14, 2025
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Your Identity Crisis is Coming: Why Western Europe's Leading Brands Are Looking Beyond American Solutions9:30 AM - 10:00 AM
Databeskyttelsesretlige tendenser ved udvikling og test af brugervendte applikationer. 9:30 AM - 10:05 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Hvilken slags IT-sikkerhed er den bedste investering?10:15 AM - 10:45 AM
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10:15 AM - 10:50 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?11:00 AM - 11:30 AM
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?11:00 AM - 11:45 AM
Guided tour | Governance & Compliance11:30 AM - 12:10 PM
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?11:45 AM - 12:20 PM
Cybersikkerhed anno 2025 – Fra globale trusler til fælles danske løsninger12:00 PM - 12:30 PM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
OT sikkerhed fra komponent til kode og drift12:30 PM - 1:00 PM
Fra global afhængighed til lokal kontrol – cloud i en geopolitisk virkelighed12:30 PM - 1:30 PM
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
Will digital communication still be secure in 2035?1:15 PM - 1:50 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR2:00 PM - 2:35 PM
KEYNOTE | The Whistleblower who exposed Apple’s spying2:00 PM - 2:45 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse3:00 PM - 3:45 PM
NIS2 i Danmark - fra lovkrav til operationelle tiltag3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
KEYNOTE | Max Schrems on data protection in times of global unease4:00 PM - 4:45 PM
Thursday, May 15, 2025
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI9:45 AM - 10:15 AM
Modernize data protection with a secured Datacenter by design9:45 AM - 10:15 AM
Beskyttelse af kroppens dyrebareste data! - IT-sikkerhedsarbejdet hos National Genom Center10:15 AM - 10:50 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
Compliancedokumentation, der understøtter flere standarder11:00 AM - 11:30 AM
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage11:00 AM - 11:45 AM
AI in Security and Security in AI11:45 AM - 12:15 PM
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?12:00 PM - 12:45 PM
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security12:30 PM - 1:00 PM
DEBAT | Deadline for NIS2 er lige om hjørnet - er it-sikkerheden så på plads?12:30 PM - 1:05 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
Guided tour | Governance & Compliance1:00 PM - 1:40 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
Autentifikation af medarbejdere og kunder - nu og i fremtiden1:30 PM - 2:00 PM
The missing link in Security Operations: Why Observability matters1:30 PM - 2:00 PM
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR2:00 PM - 2:45 PM