TOPIC | Governance & Compliance

Businesses are increasingly required to protect their data, and this demands much more than just technical IT security.

Legislation such as GDPR and the new NIS2 Directive, combined with record-high pressure from cybercriminals, has significantly raised the requirements for internal information security. Maintaining the necessary level of expertise to meet these demands is both resource-intensive and challenging.

Gain practical tools and best practices that will help your business navigate the new legislation and minimize the risk of your data falling into the wrong hands.

Wednesday, May 14, 2025
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Your Identity Crisis is Coming: Why Western Europe's Leading Brands Are Looking Beyond American Solutions9:30 AM - 10:00 AM
Databeskyttelsesretlige tendenser ved udvikling og test af brugervendte applikationer. 9:30 AM - 10:05 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Hvilken slags IT-sikkerhed er den bedste investering?10:15 AM - 10:45 AM
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10:15 AM - 10:50 AM
Gør risikoarbejdet konkret - og få ledelsen med10:30 AM - 11:00 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?11:00 AM - 11:30 AM
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?11:00 AM - 11:45 AM
Guided tour | Governance & Compliance11:30 AM - 12:10 PM
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?11:45 AM - 12:20 PM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
Cybersikkerhed anno 2025 – Fra globale trusler til fælles danske løsninger12:00 PM - 12:30 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
OT sikkerhed fra komponent til kode og drift12:30 PM - 1:00 PM
Is the defence sector just a black box, or can startups and scale-ups become suppliers? 12:30 PM - 1:00 PM
Forskellen på backup, availability og disaster recovery12:30 PM - 1:30 PM
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
Will digital communication still be secure in 2035?1:15 PM - 1:50 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR2:00 PM - 2:35 PM
KEYNOTE | The Whistleblower who exposed Apple’s spying2:00 PM - 2:45 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse3:00 PM - 3:45 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
NIS2 i Danmark - fra lovkrav til operationelle tiltag3:30 PM - 4:00 PM
KEYNOTE | Max Schrems on data protection in times of global unease4:00 PM - 4:45 PM
Thursday, May 15, 2025
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.9:45 AM - 10:15 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI og AI9:45 AM - 10:15 AM
Beskyttelse af kroppens dyrebareste data! - IT-sikkerhedsarbejdet hos National Genom Center10:15 AM - 10:50 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Compliancedokumentation, der understøtter flere standarder11:00 AM - 11:30 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage11:00 AM - 11:45 AM
AI in Security and Security in AI11:45 AM - 12:15 PM
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?12:00 PM - 12:45 PM
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security12:30 PM - 1:00 PM
DEBAT | Deadline for NIS2 er lige om hjørnet - er it-sikkerheden så på plads?12:30 PM - 1:05 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
Guided tour | Governance & Compliance1:00 PM - 1:40 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
Hvad er compliance, risikovurdering og dokumentation værd, hvis det ikke bliver omsat til praksis?1:15 PM - 1:45 PM
Autentifikation af medarbejdere og kunder - nu og i fremtiden1:30 PM - 2:00 PM
The missing link in Security Operations: Why Observability matters1:30 PM - 2:00 PM
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR2:00 PM - 2:45 PM