TOPIC | Cybersecurity & AI

Artificial Intelligence (AI) is becoming one of the most transformative forces in cybersecurity – both as an advanced threat and as an effective defense tool.

Cybercrime affects Danish businesses across sectors, and hacker attacks aimed at extortion or sabotage can result in significant financial losses. At the same time, cybercriminals are leveraging AI to develop more sophisticated attacks. To protect against AI-based threats, businesses must utilize AI’s capabilities to identify, predict, and defend against cyber threats.

Learn how to use AI to strengthen your company’s defense, ensure business continuity, and prepare for future cybersecurity challenges.

Wednesday, May 14, 2025
The AI Battleground: Defending the Enterprise in the Era of Intelligent Threats9:30 AM - 10:00 AM
🔒 Skal du outsorce eller bygge din egen SOC?9:30 AM - 10:00 AM
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar9:30 AM - 10:00 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Neutralizing Threats Before They Emerge Using DNSDR9:45 AM - 10:15 AM
Sikkerhed og brugeroplevelse går sjældent hånd i hånd – eller gør de? - Hør hvorfor det hypede Security Service Edge er et af de vigtigste sikkerhedsløsninger at implementere i 2025.10:15 AM - 10:45 AM
These are the Drioids you are looking for10:15 AM - 10:45 AM
Why Exposure Management is important to Detection and Response?10:15 AM - 10:45 AM
Why Exposure Management is important to Detection and Response?10:15 AM - 10:45 AM
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10:15 AM - 10:50 AM
Hold på hat og data - Data Leakage Prevention i 202510:30 AM - 11:00 AM
To speak with the shadow you must know the language of darkness11:00 AM - 11:30 AM
Harder, Better, Faster, Stronger11:45 AM - 12:15 PM
The Geopolitics of Cybercrime11:45 AM - 12:15 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity1:00 PM - 1:45 PM
Guided tour | Cybersecurity & AI1:30 PM - 2:10 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
Harnessing the Power of GenAI with a Platform-Centric Approach2:00 PM - 2:30 PM
Cultivating a security-conscious culture without undermining employee morale2:15 PM - 2:45 PM
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy2:45 PM - 3:15 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Navigating the Storm: Security Trends in an Era of Accelerated Change3:00 PM - 3:30 PM
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse3:00 PM - 3:45 PM
Governance, risk og compliance inden for cybersikkerhed3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals3:30 PM - 4:00 PM
Offensive security in an age of defensive tooling3:45 PM - 4:15 PM
Thursday, May 15, 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?9:00 AM - 9:45 AM
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Bridging IT & OT Security: Navigating Convergence for a Resilient Future9:30 AM - 10:00 AM
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.9:30 AM - 10:00 AM
Modernize data protection with a secured Datacenter by design9:45 AM - 10:15 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI9:45 AM - 10:15 AM
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 202510:15 AM - 10:45 AM
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know11:00 AM - 11:30 AM
Guided tour | Cybersecurity & AI11:00 AM - 11:40 AM
Future-Ready Identity Security: Innovations for Hybrid Environments11:15 AM - 11:45 AM
AI in Security and Security in AI11:45 AM - 12:15 PM
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11:45 AM - 12:15 PM
Outpacing Cloud Threats: Detection and Response Streamlined11:45 AM - 12:15 PM
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.12:00 PM - 12:30 PM
Playing with Fire: Hacking and Securing AI Pipelines12:00 PM - 12:30 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
From Alerts to Action: AI-Powered Threat Defense1:15 PM - 1:45 PM
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat1:15 PM - 1:50 PM
The missing link in Security Operations: Why Observability matters1:30 PM - 2:00 PM
Security Strategy for the AI Age1:30 PM - 2:00 PM
AI in Application Security: Opportunites, threats and strategic defences2:00 PM - 2:30 PM
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR2:00 PM - 2:45 PM
AI for security and security for AI3:00 PM - 3:30 PM