SPEAKERS 2025
This is a comprehensive overview of all speakers at V2 Security Copenhagen.
The list of speakers will be updated continuously.
We look forward to welcoming you to two days filled with learning, reflection, and inspiration!

Allan Frank
Datatilsynet
IT-sikkerhedsspecialist
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse
Datatilsynet
IT-sikkerhedsspecialist
KEYNOTE | Dét betyder Trumps kaos for din databeskyttelse

Ben Westwood
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR

Caroline Stage Olsen
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Carsten Baum
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?

David Jacoby
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable

Eirik Gulbrandsen
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR




Kristian Vengsgaard
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage


Lone Juric Sørensen
Aarhus Kommune
Chef for Fælles IT og Digitalisering
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?
Aarhus Kommune
Chef for Fælles IT og Digitalisering
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?

Lucas Cone
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat


Mette Harbo
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Michael Sjøberg
Delta Crisis Management
Hostage & Ransomware Negotiator
Ransomwareangreb - forhandling eller ej?
Delta Crisis Management
Hostage & Ransomware Negotiator
Ransomwareangreb - forhandling eller ej?

Paul Rosenzweig
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?


Rune Espensen
Nordea
Head of Information Security Office
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned
Nordea
Head of Information Security Office
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned

Sanne Bech
Stougaard & Bech
Partner, advokat
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten
Stougaard & Bech
Partner, advokat
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten


Adam Salameh
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.


Alexandru Rusu
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy

Amos Green
Senior Sales Engineer – Nordics
RSA
Bridging IT & OT Security: Navigating Convergence for a Resilient Future
Senior Sales Engineer – Nordics
RSA
Bridging IT & OT Security: Navigating Convergence for a Resilient Future

Andrew Rose
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know


Ariel Merzer
Manager, Email Security Engineer EMEA
Checkpoint
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals
Manager, Email Security Engineer EMEA
Checkpoint
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals

Barnaby Nickels
Territory Account Manager, UKI & Nordic
Checkpoint
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary
Territory Account Manager, UKI & Nordic
Checkpoint
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary

Blair Anderson
MDR & Identity Sales Specialist - Northern Europe
Future-Ready Identity Security: Innovations for Hybrid Environments
MDR & Identity Sales Specialist - Northern Europe
Future-Ready Identity Security: Innovations for Hybrid Environments



Chris Dearden
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond

Christian Rutrecht
Director, System Engineering
Fortinet
Hold på hat og data - Data Leakage Prevention i 2025
Director, System Engineering
Fortinet
Hold på hat og data - Data Leakage Prevention i 2025





Craig Sanderson
Principal Cyber Security Strategist
Infoblox
Neutralizing Threats Before They Emerge Using DNSDR
Principal Cyber Security Strategist
Infoblox
Neutralizing Threats Before They Emerge Using DNSDR

Daniel Stentebjerg Petersen - WithSecure
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025

Dennis Ladefoged
Teamlead, Systems Engineering Enterprise
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar
Teamlead, Systems Engineering Enterprise
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar

Ellis Fincham
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?


Frank Stott
Channel Systems Engineer
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design
Channel Systems Engineer
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design

Fredrik Hallberg
Sales Director for Key Accounts, Nordics and Baltics
Yubico
Devising a modern MFA-strategy in an AI world
Sales Director for Key Accounts, Nordics and Baltics
Yubico
Devising a modern MFA-strategy in an AI world



Helle Mørup
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?


Ignacio Arnaldo
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC

Jacob Herbst
CTO - Chief Technical Officer
Dubex
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik
CTO - Chief Technical Officer
Dubex
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik
Cybersikkerhed anno 2025 – Cyberkriminalitet og geopolitik



Janus Miller von Platen Hallermund
Head of Connectivity & Beyond
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Head of Connectivity & Beyond
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Javvad Malik
Lead Security Awareness Advocate
Cultivating a security-conscious culture without undermining employee morale
Lead Security Awareness Advocate
Cultivating a security-conscious culture without undermining employee morale

Jens Myrup Pedersen
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times

Jens Ole Andersen
Breaker of VPNs, Defender of Access
Admin by Request
Hackers Don’t Target You. They Target Your Vendors.
Hackers Don’t Target You. They Target Your Vendors.
Breaker of VPNs, Defender of Access
Admin by Request
Hackers Don’t Target You. They Target Your Vendors.
Hackers Don’t Target You. They Target Your Vendors.

Jesper Mikkelsen
Technical Director Nordics
Trend Micro Denmark
These are the Drioids you are looking for
Technical Director Nordics
Trend Micro Denmark
These are the Drioids you are looking for


Jesper B. Hansen
Chief Operating Officer
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger
Chief Operating Officer
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger

Jesper Kastoft Bertelsen
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.

Jimmy Richmond
Identity Specialist Engineer
Future-Ready Identity Security: Innovations for Hybrid Environments
Identity Specialist Engineer
Future-Ready Identity Security: Innovations for Hybrid Environments


Jugraj Singh
Consulting Systems Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change
Consulting Systems Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change

Julien Bruinaud
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences


Kaare Mortensen
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security

Kalle Jaaskelainen
Principal Solutions Architect
Securityscorecard
Managing Third-Party Risk in the Age of DORA & NIS 2
Principal Solutions Architect
Securityscorecard
Managing Third-Party Risk in the Age of DORA & NIS 2





Kim Elgaard
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer

Kristian Meincke
Co-founder
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs
Co-founder
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs




Lars Thoren
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness


Lone Ryg Olesen
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark

Luc Alptuna
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic


Markus Alkio
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025


Martin Plesner-Jacobsen
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Martin Roskelly
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
SoftwareOne
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
SoftwareOne
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?

Matilda Eriksson
Cloudflare Area VP Northern Europe
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society
Cloudflare Area VP Northern Europe
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society

Matthew Brady
Sales Engineering Manager
Black Duck
Your AppSec Assessments Are Wrong, And Why It Matters
Sales Engineering Manager
Black Duck
Your AppSec Assessments Are Wrong, And Why It Matters


Michael Andersen
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Michael Gimm
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Michael Winsløw
Senior Architect & Security Officer
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE
Senior Architect & Security Officer
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE

Mick Mortensen
Netværk/Sikkerheds arkitekt
Salling Group
Salling Group: Forsyningssikkerhed i en usikker verden
Netværk/Sikkerheds arkitekt
Salling Group
Salling Group: Forsyningssikkerhed i en usikker verden

Mikkel Planck
Senior Cybersecurity Specialist
Harnessing the Power of GenAI with a Platform-Centric Approach
Senior Cybersecurity Specialist
Harnessing the Power of GenAI with a Platform-Centric Approach

Mikkel Jon Larssen
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag

Nick Ibsen
Technical Security Lead, Entrust Digital Security
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Fremtidssikret identitetsstyring: Når IAM møder PKI
Technical Security Lead, Entrust Digital Security
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Fremtidssikret identitetsstyring: Når IAM møder PKI

Nick Jones
Head of Global Research
WithSecure Consulting
Leveraging offensive security expertise for cost-conscious security
Head of Global Research
WithSecure Consulting
Leveraging offensive security expertise for cost-conscious security


Nicolai Andersen
Senior Solution Engineer
F5
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.
Senior Solution Engineer
F5
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.


Niels Billekop
Sales and Marketing Manager
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?
Sales and Marketing Manager
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?

Niels Frimodt Sørensen
Direktør & IT-sikkerhedskonsulent
IN Groupe Signaturgruppen A/S
Autentifikation af medarbejdere og kunder - nu og i fremtiden
Direktør & IT-sikkerhedskonsulent
IN Groupe Signaturgruppen A/S
Autentifikation af medarbejdere og kunder - nu og i fremtiden

Nikolaj Holm Vang
Director, Entrust Digital Security, North Western Europe
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Director, Entrust Digital Security, North Western Europe
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt




Petter Glenstrup
Director, Sales Engineering - DK - Arctic Wolf
Arctic WOlf
The holistic approach with Arctic Wolf as your Security Operations Partner
The holistic approach with Arctic Wolf as your Security Operations Partner
Director, Sales Engineering - DK - Arctic Wolf
Arctic WOlf
The holistic approach with Arctic Wolf as your Security Operations Partner
The holistic approach with Arctic Wolf as your Security Operations Partner


Rabia Yasin Sharif
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag

Rasmus Bork
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware



Scott Williamson
Director Managed Services
WatchGuard Technologies
From Alerts to Action: AI-Powered Threat Defense
Director Managed Services
WatchGuard Technologies
From Alerts to Action: AI-Powered Threat Defense

Simon Ogden
Sr. Solutions Engineer
Cribl
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl
Sr. Solutions Engineer
Cribl
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl

Simon Simonsen
Senior Security architect
Crwd
The cybersecurity startup playbook - trends, funding and future giants
Senior Security architect
Crwd
The cybersecurity startup playbook - trends, funding and future giants

Simon Krogh Bjerre
Security Advisor
itm8
Hvem hackede os? En virkelig beretning om at finde de skyldige
Security Advisor
itm8
Hvem hackede os? En virkelig beretning om at finde de skyldige



