SPEAKERS 2025
This is a comprehensive overview of all speakers at V2 Security Copenhagen.
The list of speakers will be updated continuously.
We look forward to welcoming you to two days filled with learning, reflection, and inspiration!


Ben Westwood
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR

Caroline Stage Olsen
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Carsten Baum
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?

David Jacoby
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable

Eirik Gulbrandsen
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR
Norges datatilsyn
Specialrådgiver
Norwegian Data Protection Authority: Challenges Related to M365 Copilot and GDPR





Ken Bonefeld
Norlys
Senior Cyber Security Advisor
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden
Norlys
Senior Cyber Security Advisor
Kritisk infrastruktur, hybridkrig og resiliens: Danmark i en ny verdensorden

Kristian Vengsgaard
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage



Lone Juric Sørensen
Aarhus Kommune
Chef for Fælles IT og Digitalisering
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?
Aarhus Kommune
Chef for Fælles IT og Digitalisering
KEYNOTE DEBAT | Tech-giganter eller alternativer: Skal Danmark løsrive sig fra USA?

Lucas Cone
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat


Mark Fiedel
Center for Cybersikkerhed
Vicedirektør
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?
Center for Cybersikkerhed
Vicedirektør
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?

Martin Kofoed
itm8
Executive Partner, Cyber Security
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?
itm8
Executive Partner, Cyber Security
KEYNOTE | Hvad lærte vi af hackersagen mod Netcompany og UFST?

Mette Harbo
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage


Adam Salameh
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.
Territory Account Manager
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.


Alexandru Rusu
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy
Solutions Engineer Manager
NinjaOne
Why Vulnerability Management Must Be at the Core of Your Cybersecurity Strategy

Amos Green
Senior Sales Engineer – Nordics
Bridging IT & OT Security: Navigating Convergence for a Resilient Future
Senior Sales Engineer – Nordics
Bridging IT & OT Security: Navigating Convergence for a Resilient Future

Andrew Rose
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know
Chief Security Officer
SoSafe
Future-Proofing Against Cybercrime: The Six Trends Every Organisation Must Know


Ariel Merzer
Manager, Email Security Engineer EMEA
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals
Manager, Email Security Engineer EMEA
Email Security: Harnessing AI to Stay Ahead of Email Cyber Criminals

Barnaby Nickels
Territory Account Manager, UKI & Nordic
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary
Territory Account Manager, UKI & Nordic
Protecting The Full Scope of the Modern Attack Surface Through The Lens Of An Adversary

Blair Anderson
MDR & Identity Sales Specialist - Northern Europe
Future-Ready Identity Security: Innovations for Hybrid Environments
MDR & Identity Sales Specialist - Northern Europe
Future-Ready Identity Security: Innovations for Hybrid Environments




Chris Dearden
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond
Enterprise Product Specialist
Delinea
Navigating the Top Cyber Threats: Insights for 2025 and Beyond

Christian Rutrecht
Director, System Engineering
Fortinet
Hold på hat og data - Data Leakage Prevention i 2025
Director, System Engineering
Fortinet
Hold på hat og data - Data Leakage Prevention i 2025





Craig Sanderson
Principal Cyber Security Strategist
Neutralizing Threats Before They Emerge Using DNSDR
Principal Cyber Security Strategist
Neutralizing Threats Before They Emerge Using DNSDR

Daniel Stentebjerg Petersen - WithSecure
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025
Cyber Security Evangelist & Thought Leader
WithSecure
Indblik i WithSecures Incident Response data – hvilke trends ser vi i 2025

Dennis Ladefoged
Teamlead, Systems Engineering Enterprise
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar
Teamlead, Systems Engineering Enterprise
Fortinet
Fra trusler til tillid: Sikkerhedsplatformens rolle i cyberforsvar

Ellis Fincham
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?
Head of Threat & XDR Practice, EMEA
Rapid7
Why Exposure Management is important to Detection and Response?


Frank Stott
Channel Systems Engineer
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design
Channel Systems Engineer
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design

Fredrik Hallberg
Sales Director for Key Accounts, Nordics and Baltics
Devising a modern MFA-strategy in an AI world
Sales Director for Key Accounts, Nordics and Baltics
Devising a modern MFA-strategy in an AI world



Helle Mørup
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?
Senior Enterprise Technical Solution Advisor
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?


Ignacio Arnaldo
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC
Director, Data Science
Corelight
How Corelight leverages Zeek, Suricata, and AI at the BlackHat NOC




Janus Miller von Platen Hallermund
Head of Connectivity & Beyond
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Head of Connectivity & Beyond
Telenor Erhverv
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Javvad Malik
Lead Security Awareness Advocate
Cultivating a security-conscious culture without undermining employee morale
Lead Security Awareness Advocate
Cultivating a security-conscious culture without undermining employee morale

Jens Myrup Pedersen
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times
Professor, Cyber Security Group
Aalborg Universitet
From Idea to Product – Building cybersecurity solutions that fit the market in turbulent times

Jens Ole Andersen
Breaker of VPNs, Defender of Access
Admin by Request
Hackers Don’t Target You. They Target Your Vendors.
Hackers Don’t Target You. They Target Your Vendors.
Breaker of VPNs, Defender of Access
Admin by Request
Hackers Don’t Target You. They Target Your Vendors.
Hackers Don’t Target You. They Target Your Vendors.



Jesper B. Hansen
Chief Operating Officer
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger
Chief Operating Officer
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger


Jimmy Richmond
Identity Specialist Engineer
Future-Ready Identity Security: Innovations for Hybrid Environments
Identity Specialist Engineer
Future-Ready Identity Security: Innovations for Hybrid Environments


Jugraj Singh
Consulting Systems Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change
Consulting Systems Engineer
Hewlett Packard Enterprise
Navigating the Storm: Security Trends in an Era of Accelerated Change

Julien Bruinaud
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences
Solutions Engineering Manager, Europe
Checkmarx
AI in Application Security: Opportunites, threats and strategic defences


Kaare Mortensen
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security
Pre-Sales Consultant
Thales
Data Risk Intelligence: Turning Insights into Action for Proactive Data Security

Kalle Jaaskelainen
Principal Solutions Architect
SecurityScorecard
Managing Third-Party Risk in the Age of DORA & NIS 2
Principal Solutions Architect
SecurityScorecard
Managing Third-Party Risk in the Age of DORA & NIS 2






Kim Elgaard
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer
Channel Security Engineer
Palo Alto Networks
Fremtidens sikre adgang til web og applikationer

Kristian Meincke
Co-founder
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs
Co-founder
Campfire Security
Building a Digital Fortress – Practical Resilience for Startups/SMEs




Lars Thoren
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness
Sales Engineer, Nordics
TXOne
To speak with the shadow you must know the language of darkness


Lone Ryg Olesen
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark
Executive Vice President, Enterprise and Innovation
Aarhus University
Fueling Cybersecurity Innovation in Denmark

Luc Alptuna
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic
Director of Alliances Europe, Network Visibility Solutions
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic


Marcus Sørensen
Cloud consultant
ScanNet
Fra global afhængighed til lokal kontrol – cloud i en geopolitisk virkelighed
Cloud consultant
ScanNet
Fra global afhængighed til lokal kontrol – cloud i en geopolitisk virkelighed

Markus Alkio
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025
Executive Vice President
NetNordic Finland
Netnordic SOC Framework with a Insight into the Dark Web and Threat Landscape 2025


Martin Plesner-Jacobsen
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Martin Roskelly
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
SoftwareOne
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?
Chairman Security Centre of Excellence, Enterprise Security Architect, Security Product Manager
SoftwareOne
AI vs. AI: Are Your Defenses Ready for Autonomous Cyberattacks?

Matilda Eriksson
Area VP Northern Europe
Cloudflare
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society
Area VP Northern Europe
Cloudflare
Panel Discussion: When Protecting the Digital Infrastructure Becomes a Fundamental Task for Society



Michael Andersen
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik
Ethical hacker og datagidselforhandler
Undgå panik ved et Ransomware-angreb: Fra alarmen går til fuldt overblik

Michael Gimm
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb
Advisory Systems Engineer
Veeam Software
Moderne databeskyttelse: sådan sikrer du din virksomhed mod cyberangreb

Michael Winsløw
Senior Architect & Security Officer
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE
Senior Architect & Security Officer
Stop med at slukke brande – fremtidssikr jeres IT-strategi med SASE


Mikkel Planck
Senior Cybersecurity Specialist
Harnessing the Power of GenAI with a Platform-Centric Approach
Senior Cybersecurity Specialist
Harnessing the Power of GenAI with a Platform-Centric Approach

Mikkel Jon Larssen
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Lead of Risk Assurance, BDO
BDO
NIS2 i Danmark - fra lovkrav til operationelle tiltag

Nick Ibsen
Technical Security Lead, Entrust Digital Security
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Fremtidssikret identitetsstyring: Når IAM møder PKI
Technical Security Lead, Entrust Digital Security
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Fremtidssikret identitetsstyring: Når IAM møder PKI

Nick Jones
Head of Global Research
WithSecure Consulting
Leveraging offensive security expertise for cost-conscious security
Head of Global Research
WithSecure Consulting
Leveraging offensive security expertise for cost-conscious security


Nicolai Andersen
Senior Solution Engineer
F5
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.
Senior Solution Engineer
F5
Er du ikke AI-ekspert? Du skal stadig beskytte dig mod AI-trusler – her er hvorfor.


Niels Billekop
Sales and Marketing Manager
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?
Sales and Marketing Manager
Arrow Symantec
AI-assistenter og Datakontrol: Hvordan undgår du, at Co-pilot lækker dine følsomme data?

Niels Frimodt Sørensen
Direktør & IT-sikkerhedskonsulent
IN Groupe Signaturgruppen A/S
Autentifikation af medarbejdere og kunder - nu og i fremtiden
Direktør & IT-sikkerhedskonsulent
IN Groupe Signaturgruppen A/S
Autentifikation af medarbejdere og kunder - nu og i fremtiden

Nikolaj Holm Vang
Director, Entrust Digital Security, North Western Europe
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt
Director, Entrust Digital Security, North Western Europe
Entrust
Fremtidssikret infrastruktur: Når CLM og PKI gøres enkelt




Petter Glenstrup
Director, Sales Engineering - DK - Arctic Wolf
Arctic WOlf
The holistic approach with Arctic Wolf as your Security Operations Partner
The holistic approach with Arctic Wolf as your Security Operations Partner
Director, Sales Engineering - DK - Arctic Wolf
Arctic WOlf
The holistic approach with Arctic Wolf as your Security Operations Partner
The holistic approach with Arctic Wolf as your Security Operations Partner


Rabia Yasin Sharif
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag

Rasmus Bork
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware






