TOPIC | Governance & Compliance

Businesses are increasingly required to protect their data, and this demands much more than just technical IT security.

Legislation such as GDPR and the new NIS2 Directive, combined with record-high pressure from cybercriminals, has significantly raised the requirements for internal information security. Maintaining the necessary level of expertise to meet these demands is both resource-intensive and challenging.

Gain practical tools and best practices that will help your business navigate the new legislation and minimize the risk of your data falling into the wrong hands.

Wednesday, May 14, 2025
Your Identity Crisis is Coming: Why Western Europe's Leading Brands Are Looking Beyond American Solutions9:30 AM - 10:00 AM
🔒 Skal du outsource eller bygge din egen SOC?9:30 AM - 10:00 AM
Databeskyttelsesretlige tendenser ved udvikling og test af brugervendte applikationer. 9:30 AM - 10:05 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
Hvilken slags IT-sikkerhed er den bedste investering?10:15 AM - 10:45 AM
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10:15 AM - 10:50 AM
Gør risikoarbejdet konkret - og få ledelsen med10:30 AM - 11:00 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?11:00 AM - 11:30 AM
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?11:00 AM - 11:45 AM
Guided tour | Governance & Compliance11:30 AM - 12:10 PM
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?11:45 AM - 12:20 PM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
Cybersikkerhed anno 2025 – Fra globale trusler til fælles danske løsninger12:00 PM - 12:30 PM
Forskellen på backup, availability og disaster recovery12:30 PM - 1:00 PM
Is the defence sector just a black box, or can startups and scale-ups become suppliers? 12:30 PM - 1:00 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
OT sikkerhed fra komponent til kode og drift12:30 PM - 1:00 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger12:45 PM - 1:15 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
Will digital communication still be secure in 2035?1:15 PM - 1:50 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR2:00 PM - 2:35 PM
KEYNOTE | The Whistleblower who exposed Apple’s spying2:00 PM - 2:45 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse3:00 PM - 3:45 PM
NIS2 i Danmark - fra lovkrav til operationelle tiltag3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
KEYNOTE | Max Schrems on data protection in times of global unease4:00 PM - 4:45 PM
Thursday, May 15, 2025
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.9:45 AM - 10:15 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI og AI9:45 AM - 10:15 AM
Beskyttelse af kroppens dyrebareste data! - IT-sikkerhedsarbejdet hos National Genom Center10:15 AM - 10:50 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
Compliancedokumentation, der understøtter flere standarder11:00 AM - 11:30 AM
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage11:00 AM - 11:45 AM
AI in Security and Security in AI11:45 AM - 12:15 PM
KEYNOTE | Learnings from the hacking case against Netcompany and UFST?12:00 PM - 12:45 PM
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security12:30 PM - 1:00 PM
DEBAT | Deadline for NIS2 er lige om hjørnet - er it-sikkerheden så på plads?12:30 PM - 1:05 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Guided tour | Governance & Compliance1:00 PM - 1:40 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
Autentifikation af medarbejdere og kunder - nu og i fremtiden1:30 PM - 2:00 PM
The missing link in Security Operations: Why Observability matters1:30 PM - 2:00 PM
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR2:00 PM - 2:45 PM