SPEAKERS 2025
This is a comprehensive overview of all speakers at V2 Security Copenhagen.
The list of speakers will be updated continuously.
We look forward to welcoming you to two days filled with learning, reflection, and inspiration!

Michael Sjøberg
Delta Crisis Management
Hostage & Ransomware Negotiator
Ransomwareangreb - forhandling eller ej?
Delta Crisis Management
Hostage & Ransomware Negotiator
Ransomwareangreb - forhandling eller ej?

Caroline Stage Olsen
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Moderaterne
Minister for Digital Affairs
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage



Paul Rosenzweig
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?

Mette Harbo
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Center for It og Medicoteknologi i Region Hovedstaden
Direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Kristian Vengsgaard
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage
Kombit
Administrerende direktør
KEYNOTE DEBAT | Afhængig af big tech: Hvordan tager vi magten over dansk it-infrastruktur tilbage

Torsten Schack Pedersen
Venstre
Minister for samfundssikkerhed og beredskab
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab
Venstre
Minister for samfundssikkerhed og beredskab
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab


Rune Espensen
Nordea
Head of Technology Security Oversight
Cybertruslen set fra Nordea: Konkrete erfaringer med angreb
Nordea
Head of Technology Security Oversight
Cybertruslen set fra Nordea: Konkrete erfaringer med angreb

Carsten Baum
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?
Department of Applied Mathematics and Computer Science på DTU
Associate Professor
Will digital communication still be secure in 2035?

Ben Westwood
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR
Motor Insurers Bureau
Head of Compliance & DPO
KEYNOTE | Beyond Boundaries: Life as a DPO in the age of AI and GDPR

David Jacoby
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable
Unbreached, Syndis, Hackshield
Hacker, founder and advisor
KEYNOTE | Hacked by Default: Why Digital Transformation makes us vulnerable

Signe Sophus Lai
University of Copenhagen
Tenure Track Assistant Professor
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Assistant Professor
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat

Lucas Cone
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Adjunkt
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat


Jesper Kastoft Bertelsen
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.
Cyber Defense Team Lead, Conscia
Conscia
Threat Hunting for mobile: How to stay one step ahead of bad actors and detect sophisticated mobile attacks such as Pegasus.

Niels Frimodt Sørensen
Direktør & IT-sikkerhedskonsulent
Signaturgruppen
Autentifikation af medarbejdere og kunder - nu og i fremtiden
Direktør & IT-sikkerhedskonsulent
Signaturgruppen
Autentifikation af medarbejdere og kunder - nu og i fremtiden

Jesper B. Hansen
Chief Operating Officer
Siscon
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger
Chief Operating Officer
Siscon
Risikovurdering – styrk beslutningskraften med modenhedsvurderinger










