SPEAKERS 2025
This is a comprehensive overview of all speakers at V2 Security Copenhagen.
The list of speakers will be updated continuously.
We look forward to welcoming you to two days filled with learning, reflection, and inspiration!


Ben Westwood
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR

Caroline Stage Olsen
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Carsten Baum
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?

David Jacoby
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable

Eirik Gulbrandsen
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR


Henrik Tang Brix
KITA (de kommunale it-chefer) (Favrskov Kommune)
It- og digitaliseringschef
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
KITA (de kommunale it-chefer) (Favrskov Kommune)
It- og digitaliseringschef
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage




Ken Bonefeld
Norlys
Senior Cyber Security Advisor
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden
Norlys
Senior Cyber Security Advisor
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden

Kristian Vengsgaard
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Laila Reenberg
Styrelsen for Samfundssikkerhed
Direktør
KEYNOTE | Interview: Styrelsen for Samfundssikkerheds rolle
Styrelsen for Samfundssikkerhed
Direktør
KEYNOTE | Interview: Styrelsen for Samfundssikkerheds rolle


Line Sinding Skött
Microsoft
Direktør for offentlig sektor
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Microsoft
Direktør for offentlig sektor
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Lucas Cone
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat


Mark Fiedel
Styrelsen for Samfundssikkerhed
Vicedirektør
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?
Styrelsen for Samfundssikkerhed
Vicedirektør
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?


Adam Salameh
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.

Adam Denyer-Hampton
Senior Director, Global Solutions Architects
SecurityScorecard
Managing Third-Party Risk in the Age of DORA & NIS 2
Senior Director, Global Solutions Architects
SecurityScorecard
Managing Third-Party Risk in the Age of DORA & NIS 2

Alex Mathar
Senior Officer
Danish Armed Forces
Is the defence sector just a black box, or can startups and scale-ups become suppliers?
Senior Officer
Danish Armed Forces
Is the defence sector just a black box, or can startups and scale-ups become suppliers?


Alexandru Rusu
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy

Allan Lausten
Head of Solutions Operations
ScanNet
Forskellen på backup, availability og disaster recovery
Head of Solutions Operations
ScanNet
Forskellen på backup, availability og disaster recovery

Amos Green
Senior Sales Engineer – Nordics
Bridging IT & OT Security: Navigating Convergence for a Resilient Future
Senior Sales Engineer – Nordics
Bridging IT & OT Security: Navigating Convergence for a Resilient Future


Anders Krøyer
CEO and founder of AR Comply
AR Comply
Is the defence sector just a black box, or can startups and scale-ups become suppliers?
CEO and founder of AR Comply
AR Comply
Is the defence sector just a black box, or can startups and scale-ups become suppliers?


Andrew Rose
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know


Anne Marie Berså
Partnership Lead & Talent Pool Rep.
ReDI School of Digital Integration
Built to Attract: How startups can compete for top talent in a crowded market
Nearly All Breaches Involve Living Off The Land: How Unnecessary Risk Makes You Vulnerable Abstract:
Partnership Lead & Talent Pool Rep.
ReDI School of Digital Integration
Built to Attract: How startups can compete for top talent in a crowded market
Nearly All Breaches Involve Living Off The Land: How Unnecessary Risk Makes You Vulnerable Abstract:

Ariel Merzer
Manager, Email Security Engineer EMEA
Checkpoint
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals
Manager, Email Security Engineer EMEA
Checkpoint
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals

Auke Huistra
Service Area Director Industrial and OT Security, DNV Cyber
DNV Cyber
Cyber in the supply chain: You can’t secure what you don’t know
Service Area Director Industrial and OT Security, DNV Cyber
DNV Cyber
Cyber in the supply chain: You can’t secure what you don’t know

Barnaby Nickels
Territory Account Manager, UKI & Nordic
Checkpoint
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary
Territory Account Manager, UKI & Nordic
Checkpoint
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary

Blair Anderson
MDR & Identity Sales Specialist - Northern Europe
CrowdStrike
Future-Ready Identity Security: Innovations for Hybrid Environments
MDR & Identity Sales Specialist - Northern Europe
CrowdStrike
Future-Ready Identity Security: Innovations for Hybrid Environments

Bram De Laat
Senior Solutions Architect SAAS for North EMEA at Veeam Software
Veeam
Zero Trust - Good, but not Good Enough?
Senior Solutions Architect SAAS for North EMEA at Veeam Software
Veeam
Zero Trust - Good, but not Good Enough?

Carl Leonard
Cybersecurity Strategist
Proofpoint
Outside in and inside out email security: how to protect with a human-centric approach
Cybersecurity Strategist
Proofpoint
Outside in and inside out email security: how to protect with a human-centric approach



Chris Dearden
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond



Christian Andersson
Network & Security Architect
Global Speed Without Sacrificing Security. Still struggling with laggy VPNs and security gaps? Learn how SASE rewires your network for speed, security, and scale — once and for all.
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security
Network & Security Architect
Global Speed Without Sacrificing Security. Still struggling with laggy VPNs and security gaps? Learn how SASE rewires your network for speed, security, and scale — once and for all.
Stuck with legacy firewalls and VPNs? A practical guide to joining the new age of cloud-based security


Claus Kraft
Direktør for Cybersikkerhed og Cloud - TDC Erhverv
Cloud-sikkerhed uden overblik – en tikkende bombe. - Sådan sikrer du din virksomhed mod fejlkonfigurationer.
Direktør for Cybersikkerhed og Cloud - TDC Erhverv
Cloud-sikkerhed uden overblik – en tikkende bombe. - Sådan sikrer du din virksomhed mod fejlkonfigurationer.

Craig Sanderson
Principal Cyber Security Strategist
Infoblox
Neutralizing Threats Before They Emerge Using DNSDR
Principal Cyber Security Strategist
Infoblox
Neutralizing Threats Before They Emerge Using DNSDR


Daniel Stentebjerg Petersen - WithSecure
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025

Dennis Ladefoged
Team Lead, System Engineering
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar
Team Lead, System Engineering
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar



Duncan McIntyre
Senior Solutions Engineer
Snyk
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code
Senior Solutions Engineer
Snyk
Efficiency vs. Security: Striking the Right Balance with AI-Generated Code

Ellis Fincham
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?


Frank Stott
Channel Systems Engineer
Hewlett Packard Enterprise
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.
Channel Systems Engineer
Hewlett Packard Enterprise
Moderniser din data beskyttelse med ONEHPE Datacenter Secured by design.

Fredrik Hallberg
Sales Director for Key Accounts, Nordics and Baltics
Devising a modern MFA-strategy in an AI world
Sales Director for Key Accounts, Nordics and Baltics
Devising a modern MFA-strategy in an AI world

Gabriel Stoba
Cloud Sales Engineer
CrowdStrike
Outpacing Cloud Threats: Detection and Response Streamlined
Cloud Sales Engineer
CrowdStrike
Outpacing Cloud Threats: Detection and Response Streamlined


Helle Mørup
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?


Ignacio Arnaldo
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC

Jack Lawrence
Presales Engineer
mnemonic
Incident Response Insights: Lessons Learned, How to Prepare, and the Role of AI
Presales Engineer
mnemonic
Incident Response Insights: Lessons Learned, How to Prepare, and the Role of AI




Javvad Malik
Lead Security Awareness Advocate
KnowBe4
Cultivating a security-conscious culture without undermining employee morale
Lead Security Awareness Advocate
KnowBe4
Cultivating a security-conscious culture without undermining employee morale

Jeff Jones
Territory Director | EMEA
Admin By Request
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.
Territory Director | EMEA
Admin By Request
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.
Vendor, vidi, vici: 5 ways hackers conquer your supply chain.

Jens Myrup Pedersen
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times




Jesper B. Hansen
Chief Operating Officer
Siscon
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger
Chief Operating Officer
Siscon
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger

Jesper Kastoft Bertelsen
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.

Jimmy Richmond
Identity Specialist Engineer
CrowdStrike
Future-Ready Identity Security: Innovations for Hybrid Environments
Identity Specialist Engineer
CrowdStrike
Future-Ready Identity Security: Innovations for Hybrid Environments


Josef Gustafsson
Systems Engineer
Corelight Nordics
Nowhere to hide: Hunting adversaries on the Network
Systems Engineer
Corelight Nordics
Nowhere to hide: Hunting adversaries on the Network

Jugraj Singh
Consulting Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change
Consulting Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change

Julien Bruinaud
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences


Kaare Mortensen
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security




Kenneth Thorsted
Senior Security Advisor
Wingmen
🔒 Skal du outsorce eller bygge din egen SOC?
🔒 Skal du outsorce eller bygge din egen SOC?
Senior Security Advisor
Wingmen
🔒 Skal du outsorce eller bygge din egen SOC?
🔒 Skal du outsorce eller bygge din egen SOC?


Kenneth Rosenkrantz - Microsoft
Senior Program Manager for Microsoft Security Copilot
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?
Senior Program Manager for Microsoft Security Copilot
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?

Kim Elgaard
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer

Kristian Meincke
Solution Architect
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs
Solution Architect
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs



Lars Bærentzen
Administrerende direktør
Siscon
Compliancedokumentation, der understøtter flere standarder
Administrerende direktør
Siscon
Compliancedokumentation, der understøtter flere standarder

Lars Thoren
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness


Lone Ryg Olesen
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark

Luc Alptuna
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic




Markus Alkio
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025

Martijn Doedens
Senior Solutions Engineer
Akamai Technologies
Exposing the New Frontier of API Security Threats
Senior Solutions Engineer
Akamai Technologies
Exposing the New Frontier of API Security Threats

Martin Plesner-Jacobsen
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Martin Roskelly
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
Softwareone
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
Softwareone
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?

Martin Hjort Østergaard
Head of Solution Sales
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Head of Solution Sales
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Matilda Eriksson
Area VP Northern Europe
Cloudflare
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society
Area VP Northern Europe
Cloudflare
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society

Matthew Brady
Sales Engineering Manager
Black Duck
Your AppSec Assessments Are Wrong, And Why It Matters
Sales Engineering Manager
Black Duck
Your AppSec Assessments Are Wrong, And Why It Matters

Matthew Thomas Clark
Director of Security, Datacenter & Cloud Services
Netnordic
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society
Director of Security, Datacenter & Cloud Services
Netnordic
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society


Michael Andersen
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Michael Gimm
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Michael Winsløw
Senior Architect & Security Officer
Itavis
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE
Senior Architect & Security Officer
Itavis
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE

Mick Mortensen
Netværk/Sikkerheds arkitekt
Salling Group
Salling Group: Forsyningssikkerhed i en usikker verden
Netværk/Sikkerheds arkitekt
Salling Group
Salling Group: Forsyningssikkerhed i en usikker verden

Mikkel Planck
Senior Cybersecurity Specialist
Crowdstrike
Harnessing the Power of GenAI with a Platform-Centric Approach
Senior Cybersecurity Specialist
Crowdstrike
Harnessing the Power of GenAI with a Platform-Centric Approach

Mikkel Jon Larssen
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag



