EMNE | Cybertrusler & Angreb

De digitale trusler udvikler sig hastigt, og cyberangreb bliver både mere målrettede og sofistikerede.

Temaet stiller skarpt på de aktuelle trusselsbilleder fra ransomware og phishing til statssponsorerede angreb og præsenterer de nyeste metoder til detektion, forebyggelse og respons.

Fokus er både på teknologi og menneskelig faktor.

onsdag den 6. maj 2026
Inspiration & debate: Hybrid Warfare and the Invisible Front – Is Denmark Ready for the New Reality?09.00 - 09.45Main Stage
Sådan løfter AI jeres cyberforsvar09.30 - 10.00Sal 1
Assume breach, prepare for recovery: why data resilience is mandatory for business survival09.45 - 10.15Sal 3
Exposure Management in a Changing World - Navigating Uncertainty and Volatility09.45 - 10.15Theater 10
The new frontier of cyber threats09.45 - 10.15Cyber Innovation Stage
Leman’s Security Transformation: A Customer Journey with Arctic Wolf09.45 - 10.15Sal 7
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
Join this exclusive expert session where we cut through the buzzwords and share practical ways to secure AI in the enterprise10.15 - 10.45Sal 8
TDC Erhverv Cyber Threat Intelligence - Et nationalt indblik10.30 - 11.00Sal 2
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Sal 3
Unlock AI Without the Risk: How to See, Govern, and Secure Every AI Tool in Your Network10.30 - 11.00Sal 6
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity10.30 - 11.00Guidede ture mødested
The Invisible Insider: When AI Has Autonomy11.00 - 11.30Sal 5
From signals to stories: Don't just go with the (net)flow11.00 - 11.30Sal 8
Secure by Design – Fremtiden for endpoint beskyttelse11.15 - 11.45Sal 2
The Proactive Pivot: How Operational Threat Intelligence and Exposure Management Defeat AI Scaled Attacks11.15 - 11.45Theater 10
Cyber Resilience at Speed and Scale with FIDO Pre-Reg11.15 - 11.45Sal 6
Den moderne arbejdsplads uden grænser: Centraliseret kontrol og Zero Trust med Chrome Enterprise11.15 - 11.45Sal 3
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats11.30 - 12.30Guidede ture mødested
Stop Guessing, Start Knowing: Turning Intelligence into Remediation11.45 - 12.15Sal 1
The "Vibe Coding" Trap: Securing Agentic AI11.45 - 12.15Sal 8
Gør backup til en aktiv del af din sikkerhedsstrategi11.45 - 12.15Sal 5
Mennesket som angrebsflade – fra phishing til CEO-fraud og deepfakes12.00 - 12.30Sal 6
Reaction to Readiness: Practical Resilience Strategies in an era of Geopolitical Uncertainty12.30 - 13.00Sal 5
Cisco Cybersecurity Customer Case: Samsøe Samsøe12.30 - 13.00Sal 1
When reality lies: Deepfakes and the Evolution of Phishing APT12.30 - 13.00Theater 9
Keepit: When the Cloud Goes Dark — Resilience Lessons from Hybrid Threats12.30 - 13.00Sal 8
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business12.30 - 13.00Guidede ture mødested
API security threats in the real world12.45 - 13.15Sal 2
Europe First: Fremtidssikret informationssikkerhed i en ustabil verden12.45 - 13.15Sal 3
It trusselsbilledet anno 202612.45 - 13.15Sal 6
Katten efter musen12.45 - 13.30Theater 10
CEO vs Hacker - Lektioner fra Dark Web13.15 - 13.45Theater 9
Beyond the Perimeter: The New Identity Mandate13.15 - 13.45Sal 1
Fra Trusler til Træthed, fra Fatigue til Fokus13.15 - 13.45Sal 4
Securing Every Identity: Humans, Machines, and AI13.15 - 13.45Sal 5
Stop med kun at tale om sikkerhed – her er de konkrete greb, der skaber handling13.15 - 13.45Sal 8
Closing the Identity Blind Spots Across Humans, Machines, and AI13.30 - 14.00Sal 2
En scanner viser potentielle huller. En angriber finder veje. Vi viser dig forskellen.13.30 - 14.00Sal 3
Why Business Resilience Requires an End‑to‑End Mindset13.30 - 14.00Sal 6
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice13.30 - 14.00Guidede ture mødested
Hybrid Mesh Firewalls – Gartner Buzzword eller nødvendig ændring i arkitekturen?13.30 - 14.00Theater 10
Beyond the Chatbot: Engineering Agentic Workflows for the Modern SOC14.00 - 14.30Sal 1
Styrk jeres cyber-resiliens med moderne databeskyttelse14.00 - 14.30Sal 5
2026 State of Security14.00 - 14.30Sal 4
Breaking Down Europe’s Threat Landscape14.00 - 14.30Theater 9
AI workload fundamentals & the new traffic pattern14.00 - 14.30Sal 8
Data Security & AI Data Governance — Creating an Experience Worth Trusting14.15 - 14.45Sal 3
From Exposure to Exploitation: A Data-Driven Look at Danish Cyber Threats14.15 - 14.45Sal 6
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value14.30 - 15.00Guidede ture mødested
Network Segmentation Pitfalls and Hybrid Attack Paths14.45 - 15.15Theater 9
Preemptive Security as a foundational cyber defense control14.45 - 15.15Sal 4
Ransomware resilience14.45 - 15.15Sal 5
The Application-First Path to Zero Trust14.45 - 15.15Sal 8
TBD - Good AI vs. Bad AI: Outwitting Adversaries with AI-Native Cybersecurity15.00 - 15.30Sal 7
Trusselsbilledet 2026: Fra helikopterperspektiv til hverdagens beslutninger15.00 - 15.30Sal 6
The Outside-In Advantage: Modernising TPRM with AI and Threat Intelligence15.30 - 16.00Sal 5
The New Perimeter: Securing Against the New Era of Autonomous Threats15.30 - 16.00Sal 8
Beyond the Checklist: Unifying IT, IoT, and OT to Future-Proof Your Cyber Resilience15.30 - 16.00Sal 4
Quiztime: "The Cyber Clash" - Ingeniørens store sikkerhedsquiz15.30 - 16.05V2 Stage
Reporting Active Exploits in 24 Hours: Are You Ready for the CRA?15.45 - 16.15Sal 3
torsdag den 7. maj 2026
AI or Die: Achieving the Autonomous SOC09.45 - 10.15Sal 6
The Cyber Arena: A CTF for Curious Minds and Seasoned Hackers09.45 - 11.45Sal 2
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice10.00 - 10.30Guidede ture mødested
Live demo: angreb vs. forsvar - følg angrebet live og se Splunk skabe fuld visibilitet10.15 - 10.45Theater 9
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
Unlock AI Without the Risk: How to See, Govern, and Secure Every AI Tool in Your Network10.15 - 10.45Sal 5
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Theater 10
Leveling the Playing Field: Using Agentic AI and Network Evidence to Win the Cyber Arms Race11.00 - 11.30Sal 8
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value11.00 - 11.30Guidede ture mødested
Think like an adversary. Beyond CTEM "Your security metrics.. might be lying to you"11.00 - 11.30Sal 4
Usynlig fjende: Da cyberkrigen ramte Danmark11.00 - 11.35V2 Stage
Er jeres flåde klar til en Ransomware-fri fremtid? En praktisk guide til ChromeOS-migrering11.15 - 11.45Sal 3
Cloud Security & Visibility11.45 - 12.15Sal 5
Cloud Security in the AI Era: The Biggest Risks and How to Stop Them11.45 - 12.15Sal 8
AI løber stærkt. Sørg for, at dine data ikke løber fra dig12.00 - 12.30Sal 7
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity12.00 - 12.30Guidede ture mødested
Quantumtruslen forklaret12.45 - 13.15Sal 3
The ROI of Prevention: Mastering the Basics to Build Real Cyber Resilience12.45 - 13.15Sal 7
Breaking the Reactive Cycle: A Masterclass in Modern Cyber Security for MSPs12.45 - 13.15Sal 6
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats13.00 - 13.30Guidede ture mødested
Open MDR: Fremtidens MDR er fleksibel, integreret og åben13.15 - 13.45Sal 4
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business14.00 - 14.30Guidede ture mødested