TOPIC | Cyber Threats & Attacks

The digital threat to Danish businesses is greater than ever.

Today, the question is no longer whether your organization will be compromised, but when it will happen – and how you can minimize the damage when it does. Hackers often gain access through compromised employees, making access control and role-based security critical elements in cybersecurity efforts.

Meet those who have been in the eye of the storm and gain insights into the latest attack methods, how to build robust defenses, and why a proactive approach to cybersecurity is essential.

Wednesday, May 14, 2025
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab9:30 AM - 9:45 AM
Redefining Threat Detection9:30 AM - 10:00 AM
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
KEYNOTE | Interview: Styrelsen for Samfundssikkerheds rolle 10:00 AM - 10:45 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik10:15 AM - 10:45 AM
These are the Drioids you are looking for10:15 AM - 10:45 AM
Hvilken slags IT-sikkerhed er den bedste investering?10:15 AM - 10:45 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
Guided tour | Cyber Threats & Attacks10:30 AM - 11:10 AM
Microsegmentation in Practise11:00 AM - 11:30 AM
To speak with the shadow you must know the language of darkness11:00 AM - 11:30 AM
From Cybercrime to Cyber Warfare – Startups/SME’s on the Frontline11:00 AM - 11:30 AM
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary11:00 AM - 11:30 AM
Hvor går grænsen for politiets hacking-metoder?11:00 AM - 11:35 AM
Hackers Don’t Target You. They Target Your Vendors.11:15 AM - 11:45 AM
Are we having an identity crisis?11:15 AM - 11:45 AM
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.11:15 AM - 11:45 AM
The holistic approach with Arctic Wolf as your Security Operations Partner11:45 AM - 12:15 PM
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.11:45 AM - 12:15 PM
The Geopolitics of Cybercrime11:45 AM - 12:15 PM
Harder, Better, Faster, Stronger11:45 AM - 12:15 PM
Building a Digital Fortress – Practical Resilience for Startups/SMEs11:45 AM - 12:15 PM
Key Insights for Security Leaders: CrowdStrike 2025 Global Threat Report12:00 PM - 12:30 PM
Your AppSec Assessments Are Wrong, And Why It Matters12:00 PM - 12:30 PM
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned12:00 PM - 12:45 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
Moving Beyond CVSS: Prioritizing Exploitable Vulnerabilities in 202512:30 PM - 1:00 PM
Hvordan arbejder hackere i 2025?12:30 PM - 1:05 PM
Guided tour EXTRA | Cyber Threats & Attacks 12:30 PM - 1:10 PM
Fra global afhængighed til lokal kontrol – cloud i en geopolitisk virkelighed12:30 PM - 1:30 PM
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity1:00 PM - 1:45 PM
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb1:15 PM - 1:45 PM
Hvem hackede os? En virkelig beretning om at finde de skyldige1:15 PM - 1:45 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik1:30 PM - 2:00 PM
Ransomware Reality Check: Turning “When” into “If”1:30 PM - 2:00 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE2:45 PM - 3:15 PM
Open Source Intelligence (OSINT) unmasking cybercriminals!2:45 PM - 3:20 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
Nowhere to hide: Hunting adversaries on the Network3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden3:30 PM - 4:05 PM
Offensive security in an age of defensive tooling3:45 PM - 4:15 PM
How do you protect AD when your skills are retiring3:45 PM - 4:15 PM
Thursday, May 15, 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?9:00 AM - 9:45 AM
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.9:30 AM - 10:00 AM
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik9:30 AM - 10:00 AM
Modernize data protection with a secured Datacenter by design9:45 AM - 10:15 AM
KEYNOTE | Demants erfaringer og tiltag efter det massive cyberangreb i 201910:00 AM - 10:45 AM
What is Your Defense? Enhancing Cyber Security with Dell MDR10:15 AM - 10:45 AM
Hvordan får man indsigt i en container baseret infrastruktur?10:15 AM - 10:45 AM
The holistic approach with Arctic Wolf as your Security Operations Partner10:15 AM - 10:45 AM
Exposing the New Frontier of API Security Threats10:30 AM - 11:00 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
Fremtidens sikre adgang til web og applikationer11:00 AM - 11:30 AM
Ingeniøren Podcast Live11:00 AM - 11:35 AM
VDI som sikker fjernadgang til OT miljøer11:15 AM - 11:45 AM
Hackers Don’t Target You. They Target Your Vendors.11:15 AM - 11:45 AM
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11:45 AM - 12:15 PM
AI in Security and Security in AI11:45 AM - 12:15 PM
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC12:00 PM - 12:30 PM
Guided tour | Cyber Threats & Attacks12:00 PM - 12:40 PM
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?12:00 PM - 12:45 PM
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security12:30 PM - 1:00 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?1:00 PM - 1:45 PM
From Alerts to Action: AI-Powered Threat Defense1:15 PM - 1:45 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
Securing the Future: How Nutanix Reduces Risk with a Built-In Security1:15 PM - 1:45 PM
Ransomwareangreb - forhandling eller ej?2:00 PM - 2:35 PM
Zero Trust - Good, but not Good Enough?2:15 PM - 2:45 PM
Transforming SecOps with Agentic AI2:45 PM - 3:15 PM
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable3:00 PM - 3:45 PM