TOPIC | Cybersecurity & AI

Artificial Intelligence (AI) is becoming one of the most transformative forces in cybersecurity – both as an advanced threat and as an effective defense tool.

Cybercrime affects Danish businesses across sectors, and hacker attacks aimed at extortion or sabotage can result in significant financial losses. At the same time, cybercriminals are leveraging AI to develop more sophisticated attacks. To protect against AI-based threats, businesses must utilize AI’s capabilities to identify, predict, and defend against cyber threats.

Learn how to use AI to strengthen your company’s defense, ensure business continuity, and prepare for future cybersecurity challenges.

Wednesday, May 14, 2025
Redefining Threat Detection9:30 AM - 10:00 AM
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar9:30 AM - 10:00 AM
The AI Battleground: Defending the Enterprise in the Era of Intelligent Threats9:30 AM - 10:00 AM
🔒 Skal du outsource eller bygge din egen SOC?9:30 AM - 10:00 AM
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt9:45 AM - 10:15 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future9:45 AM - 10:15 AM
Neutralizing Threats Before They Emerge Using DNSDR9:45 AM - 10:15 AM
Why Exposure Management is important to Detection and Response?10:15 AM - 10:45 AM
These are the Droids you are looking for10:15 AM - 10:45 AM
Sikkerhed og brugeroplevelse går sjældent hånd i hånd – eller gør de? - Hør hvorfor det hypede Security Service Edge er et af de vigtigste sikkerhedsløsninger at implementere i 2025.10:15 AM - 10:45 AM
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10:15 AM - 10:50 AM
Gør risikoarbejdet konkret - og få ledelsen med10:30 AM - 11:00 AM
Hold på hat og data - Data Leakage Prevention i 202510:30 AM - 11:00 AM
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10:30 AM - 11:00 AM
To speak with the shadow you must know the language of darkness11:00 AM - 11:30 AM
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.11:15 AM - 11:45 AM
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.11:45 AM - 12:15 PM
Harder, Better, Faster, Stronger11:45 AM - 12:15 PM
The holistic approach with Arctic Wolf as your Security Operations Partner11:45 AM - 12:15 PM
The Geopolitics of Cybercrime11:45 AM - 12:15 PM
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?11:45 AM - 12:20 PM
Cybersikkerhed anno 2025 – Fra globale trusler til fælles danske løsninger12:00 PM - 12:30 PM
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512:30 PM - 1:00 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
The Cybersecurity AI Arms Race | Winning with Autonomous Defense12:45 PM - 1:15 PM
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity1:00 PM - 1:45 PM
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?1:15 PM - 1:45 PM
From Breakthrough to Breakdown: Lessons from the CodeSealer Journey1:15 PM - 1:45 PM
Securing the energy transition1:30 PM - 2:00 PM
Ransomware Reality Check: Turning “When” into “If”1:30 PM - 2:00 PM
Guided tour | Cybersecurity & AI1:30 PM - 2:10 PM
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic2:00 PM - 2:30 PM
Harnessing the Power of GenAI with a Platform-Centric Approach2:00 PM - 2:30 PM
Cybersikkerhed i en verden af usikkerhed2:00 PM - 2:30 PM
Devising a modern MFA-strategy in an AI world2:00 PM - 2:30 PM
How do venture firms evaluate cybersecurity startup investment opportunities?2:00 PM - 2:30 PM
Cultivating a security-conscious culture without undermining employee morale2:15 PM - 2:45 PM
Building Trust from Zero – How Startups Win Customers Without a Track Record2:45 PM - 3:15 PM
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy2:45 PM - 3:15 PM
Global Speed Without Sacrificing Security. Still struggling with laggy VPNs and security gaps? Learn how SASE rewires your network for speed, security, and scale — once and for all.2:45 PM - 3:15 PM
Cyber-forsvar i en AI drevet verden2:45 PM - 3:15 PM
Managing Third-Party Risk in the Age of DORA & NIS 23:00 PM - 3:30 PM
Navigating the Storm: Security Trends in an Era of Accelerated Change3:00 PM - 3:30 PM
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.3:00 PM - 3:30 PM
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse3:00 PM - 3:45 PM
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals3:30 PM - 4:00 PM
NIS2 i Danmark - fra lovkrav til operationelle tiltag3:30 PM - 4:00 PM
A Proactive Approach to Securing Industrial Control Systems (ICS)3:30 PM - 4:00 PM
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code3:30 PM - 4:00 PM
How do you protect AD when your skills are retiring3:45 PM - 4:15 PM
Offensive security in an age of defensive tooling3:45 PM - 4:15 PM
Thursday, May 15, 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?9:00 AM - 9:45 AM
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security9:30 AM - 10:00 AM
Bridging IT & OT Security: Navigating Convergence for a Resilient Future9:30 AM - 10:00 AM
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.9:30 AM - 10:00 AM
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.9:45 AM - 10:15 AM
Incident Response Insights: Lessons Learned, How to Prepare, and the Role of AI9:45 AM - 10:15 AM
Fremtidssikret identitetsstyring: Når IAM møder PKI og AI9:45 AM - 10:15 AM
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 202510:15 AM - 10:45 AM
The holistic approach with Arctic Wolf as your Security Operations Partner10:15 AM - 10:45 AM
Beskyttelse af kroppens dyrebareste data! - IT-sikkerhedsarbejdet hos National Genom Center10:15 AM - 10:50 AM
Business Logic Attacks: Take Control of an Emerging Threat10:30 AM - 11:00 AM
Exposing the New Frontier of API Security Threats10:30 AM - 11:00 AM
Fremtidens sikre adgang til web og applikationer11:00 AM - 11:30 AM
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know11:00 AM - 11:30 AM
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11:00 AM - 11:30 AM
Teknologisk suverænitet i Europa: De største forhindringer og muligheder11:00 AM - 11:35 AM
Guided tour | Cybersecurity & AI11:00 AM - 11:40 AM
Future-Ready Identity Security: Innovations for Hybrid Environments11:15 AM - 11:45 AM
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.11:15 AM - 11:45 AM
AI in Security and Security in AI11:45 AM - 12:15 PM
Outpacing Cloud Threats: Detection and Response Streamlined11:45 AM - 12:15 PM
Fueling Cybersecurity Innovation in Denmark11:45 AM - 12:15 PM
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11:45 AM - 12:15 PM
Playing with Fire: Hacking and Securing AI Pipelines12:00 PM - 12:30 PM
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.12:00 PM - 12:30 PM
Built to Attract: How startups can compete for top talent in a crowded market12:30 PM - 1:00 PM
Nearly All Breaches Involve Living Off The Land: How Unnecessary Risk Makes You Vulnerable12:30 PM - 1:00 PM
Outside in and inside out email security: how to protect with a human-centric approach12:30 PM - 1:00 PM
DEBAT | Deadline for NIS2 er lige om hjørnet - er it-sikkerheden så på plads?12:30 PM - 1:05 PM
Cyber in the supply chain: You can’t secure what you don’t know12:45 PM - 1:15 PM
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12:45 PM - 1:15 PM
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12:45 PM - 1:15 PM
From Danish Roots to European Reach1:15 PM - 1:45 PM
🔒 Skal du outsorce eller bygge din egen SOC?1:15 PM - 1:45 PM
From Alerts to Action: AI-Powered Threat Defense1:15 PM - 1:45 PM
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat1:15 PM - 1:50 PM
The missing link in Security Operations: Why Observability matters1:30 PM - 2:00 PM
Security Strategy for the AI Age1:30 PM - 2:00 PM
AI in Application Security: Opportunites, threats and strategic defences2:00 PM - 2:30 PM
Building cyber teams that last: cultural lessons to build resilient operations2:00 PM - 2:30 PM
From Control to Continuity: Rethinking Privileged Identity Security for the Hybrid Era2:00 PM - 2:30 PM
Scaling Cybersecurity Startups – Global Opportunities in a Shifting Market2:00 PM - 2:30 PM
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR2:00 PM - 2:45 PM
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times2:45 PM - 3:15 PM
Kevin Magnussen Q&A2:45 PM - 3:30 PM
AI for security and security for AI3:00 PM - 3:30 PM