TOPIC | Cyber Threats & Attacks

The digital threat to Danish businesses is greater than ever.

Today, the question is no longer whether your organization will be compromised, but when it will happen – and how you can minimize the damage when it does. Hackers often gain access through compromised employees, making access control and role-based security critical elements in cybersecurity efforts.

Meet those who have been in the eye of the storm and gain insights into the latest attack methods, how to build robust defenses, and why a proactive approach to cybersecurity is essential.

Wednesday, May 14, 2025
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab9:30 AM - 9:45 AM
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Redefining Threat Detection9:30 AM - 10:00 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
KEYNOTE | Interview: Styrelsen for Samfundssikkerheds rolle 10:00 AM - 10:30 AM
These are the Droids you are looking for10:15 AM - 10:45 AM
Hvilken slags IT-sikkerhed er den bedste investering?10:15 AM - 10:45 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik10:15 AM - 10:45 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
Gør risikoarbejdet konkret - og få ledelsen med10:30 AM - 11:00 AM
Guided tour | Cyber Threats & Attacks10:30 AM - 11:10 AM
Microsegmentation in Practise11:00 AM - 11:30 AM
To speak with the shadow you must know the language of darkness11:00 AM - 11:30 AM
From Cybercrime to Cyber Warfare – Startups/SME’s on the Frontline11:00 AM - 11:30 AM
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary11:00 AM - 11:30 AM
Hvor går grænsen for politiets hacking-metoder?11:00 AM - 11:35 AM
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.11:15 AM - 11:45 AM
Are we having an identity crisis?11:15 AM - 11:45 AM
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.11:15 AM - 11:45 AM
The holistic approach with Arctic Wolf as your Security Operations Partner11:45 AM - 12:15 PM
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.11:45 AM - 12:15 PM
The Geopolitics of Cybercrime11:45 AM - 12:15 PM
Building a Digital Fortress – Practical Resilience for Startups/SMEs11:45 AM - 12:15 PM
Harder, Better, Faster, Stronger11:45 AM - 12:15 PM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
Key Insights for Security Leaders: CrowdStrike 2025 Global Threat Report12:00 PM - 12:30 PM
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned12:00 PM - 12:45 PM
Moving Beyond CVSS: Prioritizing Exploitable Vulnerabilities in 202512:30 PM - 1:00 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
Is the defence sector just a black box, or can startups and scale-ups become suppliers? 12:30 PM - 1:00 PM
Hvordan arbejder hackere i 2025?12:30 PM - 1:05 PM
Guided tour EXTRA | Cyber Threats & Attacks 12:30 PM - 1:10 PM
Forskellen på backup, availability og disaster recovery12:30 PM - 1:30 PM
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity1:00 PM - 1:45 PM
Hvem hackede os? En virkelig beretning om at finde de skyldige1:15 PM - 1:45 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb1:15 PM - 1:45 PM
Securing the energy transition1:30 PM - 2:00 PM
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik1:30 PM - 2:00 PM
Ransomware Reality Check: Turning “When” into “If”1:30 PM - 2:00 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Open Source Intelligence (OSINT) unmasking cybercriminals!2:45 PM - 3:20 PM
Navigating the Storm: Security Trends in an Era of Accelerated Change3:00 PM - 3:30 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Nowhere to hide: Hunting adversaries on the Network3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden3:30 PM - 4:05 PM
How do you protect AD when your skills are retiring3:45 PM - 4:15 PM
Offensive security in an age of defensive tooling3:45 PM - 4:15 PM
Thursday, May 15, 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?9:00 AM - 9:45 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik9:30 AM - 10:00 AM
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.9:30 AM - 10:00 AM
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.9:45 AM - 10:15 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI og AI9:45 AM - 10:15 AM
KEYNOTE | Demants erfaringer og tiltag efter det massive cyberangreb i 201910:00 AM - 10:45 AM
What is Your Defense? Enhancing Cyber Security with Dell MDR10:15 AM - 10:45 AM
Hvordan får man indsigt i en container baseret infrastruktur?10:15 AM - 10:45 AM
The holistic approach with Arctic Wolf as your Security Operations Partner10:15 AM - 10:45 AM
Exposing the New Frontier of API Security Threats10:30 AM - 11:00 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Fremtidens sikre adgang til web og applikationer11:00 AM - 11:30 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
Teknologisk suverænitet i Europa: De største forhindringer og muligheder11:00 AM - 11:35 AM
VDI som sikker fjernadgang til OT miljøer11:15 AM - 11:45 AM
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.11:15 AM - 11:45 AM
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11:45 AM - 12:15 PM
AI in Security and Security in AI11:45 AM - 12:15 PM
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC12:00 PM - 12:30 PM
Guided tour | Cyber Threats & Attacks12:00 PM - 12:40 PM
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?12:00 PM - 12:45 PM
Nearly All Breaches Involve Living Off The Land: How Unnecessary Risk Makes You Vulnerable Abstract:12:30 PM - 1:00 PM
Nearly All Breaches Involve Living Off The Land: How Unnecessary Risk Makes You Vulnerable Abstract:12:30 PM - 1:00 PM
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security12:30 PM - 1:00 PM
Cyber in the supply chain: You can’t secure what you don’t know12:45 PM - 1:15 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?1:00 PM - 1:45 PM
From Alerts to Action: AI-Powered Threat Defense1:15 PM - 1:45 PM
Securing the Future: How Nutanix Reduces Risk with a Built-In Security1:15 PM - 1:45 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
Ransomwareangreb - forhandling eller ej?2:00 PM - 2:35 PM
Zero Trust - Good, but not Good Enough?2:15 PM - 2:45 PM
Transforming SecOps with Agentic AI2:45 PM - 3:15 PM
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable3:00 PM - 3:45 PM