EMNE | Cybersikkerhed & AI

Kunstig intelligens (AI) er ved at blive en af de mest transformative kræfter i cybersikkerhed – både som en avanceret trussel og som et effektivt forsvarsværktøj.

Cyberkriminalitet rammer danske virksomheder på tværs af sektorer, og hackerangreb, der sigter mod afpresning eller sabotage, kan medføre store økonomiske tab. Samtidig udnytter cyberkriminelle AI til at udvikle mere sofistikerede angreb. For at beskytte sig mod AI-baserede trusler skal virksomheder udnytte AI’s evner til at identificere, forudsige og modstå cybertrusler.

Bliv klogere på, hvordan du kan bruge AI til at styrke din virksomheds forsvar, sikre driftskontinuitet og forberede jer på fremtidens cybersikkerhedsudfordringer.

onsdag den 14. maj 2025
Redefining Threat Detection09.30 - 10.00
🔒 Skal du outsorce eller bygge din egen SOC?09.30 - 10.00
The AI Battleground: Defending the Enterprise in the Era of Intelligent Threats09.30 - 10.00
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar09.30 - 10.00
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future09.45 - 10.15
Neutralizing Threats Before They Emerge Using DNSDR09.45 - 10.15
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt09.45 - 10.15
Sikkerhed og brugeroplevelse går sjældent hånd i hånd – eller gør de? - Hør hvorfor det hypede Security Service Edge er et af de vigtigste sikkerhedsløsninger at implementere i 2025.10.15 - 10.45
These are the Drioids you are looking for10.15 - 10.45
Why Exposure Management is important to Detection and Response?10.15 - 10.45
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten10.15 - 10.50
Hold på hat og data - Data Leakage Prevention i 202510.30 - 11.00
Datasikkerhed og kontrol med retning – sådan skaber du kontrol, compliance og kontinuitet i en digital verden ved brugen af DevSecOps10.30 - 11.00
To speak with the shadow you must know the language of darkness11.00 - 11.30
Hackers Don’t Target You. They Target Your Vendors.11.15 - 11.45
The Geopolitics of Cybercrime11.45 - 12.15
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.11.45 - 12.15
Harder, Better, Faster, Stronger11.45 - 12.15
The holistic approach with Arctic Wolf as your Security Operations Partner11.45 - 12.15
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?11.45 - 12.20
Cybersikkerhed anno 2025 – Fra globale trusler til fælles danske løsninger12.00 - 12.30
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 202512.30 - 13.00
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12.45 - 13.15
The Cybersecurity AI Arms Race | Winning with Autonomous Defense12.45 - 13.15
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity13.00 - 13.45
From Breakthrough to Breakdown: Lessons from the CodeSealer Journey13.15 - 13.45
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?13.15 - 13.45
Ransomware Reality Check: Turning “When” into “If”13.30 - 14.00
Guidet tur | Cybersikkerhed og AI13.30 - 14.10
Devising a modern MFA-strategy in an AI world14.00 - 14.30
Harnessing the Power of GenAI with a Platform-Centric Approach14.00 - 14.30
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic14.00 - 14.30
How do venture firms evaluate cybersecurity startup investment opportunities?14.00 - 14.30
Cybersikkerhed i en verden af usikkerhed14.00 - 14.30
Cultivating a security-conscious culture without undermining employee morale14.15 - 14.45
Global Speed Without Sacrificing Security. Still struggling with laggy VPNs and security gaps? Learn how SASE rewires your network for speed, security, and scale — once and for all.14.45 - 15.15
Building Trust from Zero – How Startups Win Customers Without a Track Record14.45 - 15.15
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy14.45 - 15.15
Cyber-forsvar i en AI drevet verden14.45 - 15.15
Managing Third-Party Risk in the Age of DORA & NIS 215.00 - 15.30
Navigating the Storm: Security Trends in an Era of Accelerated Change15.00 - 15.30
Cloud-sikkerhed uden overblik – en tikkende bombe. ​ - Sådan sikrer du din virksomhed mod fejlkonfigurationer.15.00 - 15.30
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse15.00 - 15.45
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code15.30 - 16.00
NIS2 i Danmark - fra lovkrav til operationelle tiltag15.30 - 16.00
A Proactive Approach to Securing Industrial Control Systems (ICS)15.30 - 16.00
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals15.30 - 16.00
How do you protect AD when your skills are retiring15.45 - 16.15
Offensive security in an age of defensive tooling15.45 - 16.15
torsdag den 15. maj 2025
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?09.00 - 09.45
Trusselsaktører begynder deres angreb med DNS. Få mere viden om, hvordan du afslører trusselsaktører, og stopper kritiske trusler tidligere med DNS-detection og -response.09.30 - 10.00
Bridging IT & OT Security: Navigating Convergence for a Resilient Future09.30 - 10.00
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security09.30 - 10.00
Incident Response Insights: Lessons Learned, How to Prepare, and the Role of AI09.45 - 10.15
Modernize data protection with a secured Datacenter by design09.45 - 10.15
Fremtidssikret identitetsstyring: Når IAM møder PKI09.45 - 10.15
The holistic approach with Arctic Wolf as your Security Operations Partner10.15 - 10.45
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 202510.15 - 10.45
Beskyttelse af kroppens dyrebareste data! - IT-sikkerhedsarbejdet hos National Genom Center10.15 - 10.50
Exposing the New Frontier of API Security Threats10.30 - 11.00
Business Logic Attacks: Take Control of an Emerging Threat10.30 - 11.00
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know11.00 - 11.30
Fremtidens sikre adgang til web og applikationer11.00 - 11.30
Zero Trust Meets GenAI: Safeguarding the Data That Powers the Future11.00 - 11.30
Ingeniøren Podcast Live11.00 - 11.35
Guidet tur | Cybersikkerhed og AI11.00 - 11.40
Hackers Don’t Target You. They Target Your Vendors.11.15 - 11.45
Future-Ready Identity Security: Innovations for Hybrid Environments11.15 - 11.45
AI in Security and Security in AI11.45 - 12.15
Outpacing Cloud Threats: Detection and Response Streamlined11.45 - 12.15
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl11.45 - 12.15
Fueling Cybersecurity Innovation in Denmark11.45 - 12.15
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.12.00 - 12.30
Playing with Fire: Hacking and Securing AI Pipelines12.00 - 12.30
Built to Attract: How startups can compete for top talent in a crowded market12.30 - 13.00
Outside in and inside out email security: how to protect with a human-centric approach12.30 - 13.00
DEBAT | Deadline for NIS2 er lige om hjørnet - er it-sikkerheden så på plads?12.30 - 13.05
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society12.45 - 13.15
Sov trygt med ChromeOS, der aldrig er ramt af ransomware12.45 - 13.15
🔒 Skal du outsorce eller bygge din egen SOC?13.15 - 13.45
From Alerts to Action: AI-Powered Threat Defense13.15 - 13.45
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat13.15 - 13.50
The missing link in Security Operations: Why Observability matters13.30 - 14.00
Security Strategy for the AI Age13.30 - 14.00
Navigating the Top Cyber Threats: Insights for 2025 and Beyond14.00 - 14.30
Scaling Cybersecurity Startups – Global Opportunities in a Shifting Market14.00 - 14.30
Building cyber teams that last: cultural lessons to build resilient operations14.00 - 14.30
AI in Application Security: Opportunites, threats and strategic defences14.00 - 14.30
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR14.00 - 14.45
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times14.45 - 15.15
AI for security and security for AI15.00 - 15.30