TOPIC | Cyber Threats & Attacks

The digital threat to Danish businesses is greater than ever.

Today, the question is no longer whether your organization will be compromised, but when it will happen – and how you can minimize the damage when it does. Hackers often gain access through compromised employees, making access control and role-based security critical elements in cybersecurity efforts.

Meet those who have been in the eye of the storm and gain insights into the latest attack methods, how to build robust defenses, and why a proactive approach to cybersecurity is essential.

Wednesday, May 14, 2025
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab9:30 AM - 9:45 AM
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
These are the Drioids you are looking for10:15 AM - 10:45 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik10:15 AM - 10:45 AM
Why Exposure Management is important to Detection and Response?10:15 AM - 10:45 AM
Guided tour | Cyber Threats & Attacks10:30 AM - 11:10 AM
Moving Beyond CVSS: Prioritizing Exploitable Vulnerabilities in 202511:00 AM - 11:30 AM
Are we having an identity crisis?11:15 AM - 11:45 AM
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.11:15 AM - 11:45 AM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
Key Insights for Security Leaders: CrowdStrike 2025 Global Threat Report12:00 PM - 12:30 PM
KEYNOTE | Cybertruslen set fra Nordea: Konkrete erfaringer med angreb12:00 PM - 12:45 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
Moving Beyond CVSS: Prioritizing Exploitable Vulnerabilities in 202512:30 PM - 1:00 PM
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity1:00 PM - 1:45 PM
Hvem hackede os? En virkelig beretning om at finde de skyldige1:15 PM - 1:45 PM
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb1:15 PM - 1:45 PM
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik1:30 PM - 2:00 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
Politiets værktøjer i cybercrimesager2:00 PM - 2:35 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Sådan afsløres hackere gennem OSINT metoder! 2:45 PM - 3:20 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
Nowhere to hide: Hunting adversaries on the Network3:30 PM - 4:00 PM
Offensive security in an age of defensive tooling3:45 PM - 4:15 PM
Thursday, May 15, 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?9:00 AM - 9:45 AM
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik9:30 AM - 10:00 AM
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.9:30 AM - 10:00 AM
Modernize data protection with a secured Datacenter by design9:45 AM - 10:15 AM
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11:45 AM - 12:15 PM
Nowhere to hide: Hunting adversaries on the Network12:00 PM - 12:30 PM
Guided tour | Cyber Threats & Attacks12:00 PM - 12:40 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
From Alerts to Action: AI-Powered Threat Defense1:15 PM - 1:45 PM
Ransomwareangreb - forhandling eller ej?2:00 PM - 2:35 PM
Zero Trust - Good, but not Good Enough?2:15 PM - 2:45 PM
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable3:00 PM - 3:45 PM