TOPIC | Cyber Threats & Attacks

Organizations face increasing demands for documentation, control, and regulatory compliance.

This theme addresses how to connect governance, risk management, and compliance in relation to standards such as ISO 27001 and regulations like NIS2 and DORA.

It explores how to operationalize security and build trust across the organization.

Wednesday, May 6, 2026
Sådan løfter AI jeres cyberforsvar9:30 AM - 10:00 AMTheater 1
The new frontier of cyber threats9:45 AM - 10:15 AMCyber Innovation Stage
Exposure Management in a Changing World - Navigating Uncertainty and Volatility9:45 AM - 10:15 AMTheater 10
Assume breach, prepare for recovery: why data resilience is mandatory for business survival9:45 AM - 10:15 AMTheater 3
Beyond the Acronyms: A Practical Framework for Securing Enterprise AI10:15 AM - 10:45 AMTheater 8
How to deal with Agentic AI in a Zero Trust ecosystem10:15 AM - 10:45 AMTheater 4
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity10:30 AM - 11:00 AMGuided tours meeting point
TDC Erhverv Cyber Threat Intelligence - Et nationalt indblik10:30 AM - 11:00 AMTheater 2
Det aktuelle trusselsbillede for danske virksomheder i 202610:30 AM - 11:00 AMTheater 3
Undgå det komplekse netværks kollaps: Hvorfor mindre kompleksitet giver mere sikkerhed10:30 AM - 11:00 AMTheater 6
The Invisible Insider: When AI Has Autonomy11:00 AM - 11:30 AMTheater 5
From signals to stories: Don't just go with the (net)flow11:00 AM - 11:30 AMTheater 8
Cyber Resilience at Speed and Scale with FIDO Pre-Reg11:15 AM - 11:45 AMTheater 6
Den moderne arbejdsplads uden grænser: Centraliseret kontrol og Zero Trust med Chrome Enterprise11:15 AM - 11:45 AMTheater 3
The Proactive Pivot: How Operational Threat Intelligence and Exposure Management Defeat AI Scaled Attacks11:15 AM - 11:45 AMTheater 10
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats11:30 AM - 12:30 PMGuided tours meeting point
Exposure Management: How to quickly identify and reduce real risk11:45 AM - 12:15 PMTheater 1
Gør backup til en aktiv del af din sikkerhedsstrategi11:45 AM - 12:15 PMTheater 5
Mennesket som angrebsflade – fra phishing til CEO-fraud og deepfakes12:00 PM - 12:30 PMTheater 6
Cisco Cybersecurity Customer Case: Samsøe Samsøe12:30 PM - 1:00 PMTheater 1
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business12:30 PM - 1:00 PMGuided tours meeting point
When reality lies: Deepfakes and the Evolution of Phishing APT12:30 PM - 1:00 PMTheater 9
Reaction to Readiness: Practical Resilience Strategies in an era of Geopolitical Uncertainty12:30 PM - 1:00 PMTheater 5
Keepit: When the Cloud Goes Dark — Resilience Lessons from Hybrid Threats12:30 PM - 1:00 PMTheater 8
It trusselsbilledet anno 202612:45 PM - 1:15 PMTheater 6
Europe First: Fremtidssikret informationssikkerhed i en ustabil verden12:45 PM - 1:15 PMTheater 3
The AI Ecosystem from Bots to Hackers12:45 PM - 1:15 PMTheater 2
Katten efter musen12:45 PM - 1:30 PMTheater 10
Stop med kun at tale om sikkerhed – her er de konkrete greb, der skaber handling1:15 PM - 1:45 PMTheater 8
Securing Every Identity: Humans, Machines, and AI1:15 PM - 1:45 PMTheater 5
Fra Trusler til Træthed, fra Fatigue til Fokus1:15 PM - 1:45 PMTheater 4
Beyond the Perimeter: The New Identity Mandate1:15 PM - 1:45 PMTheater 1
CEO vs Hacker - Lektioner fra Dark Web1:15 PM - 1:45 PMTheater 9
Hybrid Mesh Firewalls – Gartner Buzzword eller nødvendig ændring i arkitekturen?1:30 PM - 2:00 PMTheater 10
Why Business Resilience Requires an End‑to‑End Mindset1:30 PM - 2:00 PMTheater 6
Closing the Identity Blind Spots Across Humans, Machines, and AI1:30 PM - 2:00 PMTheater 2
En scanner viser potentielle huller. En angriber finder veje. Vi viser dig forskellen.1:30 PM - 2:00 PMTheater 3
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice1:30 PM - 2:00 PMGuided tours meeting point
Breaking Down Europe’s Threat Landscape2:00 PM - 2:30 PMTheater 9
Beyond the Chatbot: Engineering Agentic Workflows for the Modern SOC2:00 PM - 2:30 PMTheater 1
AI workload fundamentals & the new traffic pattern2:00 PM - 2:30 PMTheater 8
2026 State of Security2:00 PM - 2:30 PMTheater 4
From Exposure to Exploitation: A Data-Driven Look at Danish Cyber Threats2:15 PM - 2:45 PMTheater 6
Data Security & AI Data Governance — Creating an Experience Worth Trusting2:15 PM - 2:45 PMTheater 3
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value2:30 PM - 3:00 PMGuided tours meeting point
Ransomware resilience2:45 PM - 3:15 PMTheater 5
The Application-First Path to Zero Trust2:45 PM - 3:15 PMTheater 8
Preemptive Security as a foundational cyber defense control2:45 PM - 3:15 PMTheater 4
Trusselsbilledet 2026: Fra helikopterperspektiv til hverdagens beslutninger3:00 PM - 3:30 PMTheater 6
TBD - Good AI vs. Bad AI: Outwitting Adversaries with AI-Native Cybersecurity3:00 PM - 3:30 PMTheater 7
Beyond the Checklist: Unifying IT, IoT, and OT to Future-Proof Your Cyber Resilience3:30 PM - 4:00 PMTheater 4
The New Perimeter: Securing Against the New Era of Autonomous Threats3:30 PM - 4:00 PMTheater 8
The Outside-In Advantage: Modernising TPRM with AI and Threat Intelligence3:30 PM - 4:00 PMTheater 5
Quiztime: "The Cyber Clash" - Ingeniørens store sikkerhedsquiz3:30 PM - 4:05 PMV2 Stage
Reporting Active Exploits in 24 Hours: Are You Ready for the CRA?3:45 PM - 4:15 PMTheater 3
Thursday, May 7, 2026
AI or Die: Achieving the Autonomous SOC9:45 AM - 10:15 AMTheater 6
The Cyber Arena: A CTF for Curious Minds and Seasoned Hackers9:45 AM - 11:45 AMTheater 2
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice10:00 AM - 10:30 AMGuided tours meeting point
Live demo: angreb vs. forsvar - følg angrebet live og se Splunk skabe fuld visibilitet10:15 AM - 10:45 AMTheater 9
How to deal with Agentic AI in a Zero Trust ecosystem10:15 AM - 10:45 AMTheater 4
Undgå det komplekse netværks kollaps: Hvorfor mindre kompleksitet giver mere sikkerhed10:15 AM - 10:45 AMTheater 5
Det aktuelle trusselsbillede for danske virksomheder i 202610:30 AM - 11:00 AMTheater 10
Think like an adversary. Beyond CTEM "Your security metrics.. might be lying to you"11:00 AM - 11:30 AMTheater 4
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value11:00 AM - 11:30 AMGuided tours meeting point
Usynlig fjende: Da cyberkrigen ramte Danmark11:00 AM - 11:35 AMV2 Stage
Er jeres flåde klar til en Ransomware-fri fremtid? En praktisk guide til ChromeOS-migrering11:15 AM - 11:45 AMTheater 3
Cloud Security in the AI Era: The Biggest Risks and How to Stop Them11:45 AM - 12:15 PMTheater 8
Cloud Security & Visibility11:45 AM - 12:15 PMTheater 5
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity12:00 PM - 12:30 PMGuided tours meeting point
AI løber stærkt. Sørg for, at dine data ikke løber fra dig12:00 PM - 12:30 PMTheater 7
Quantumtruslen forklaret12:45 PM - 1:15 PMTheater 3
The ROI of Prevention: Mastering the Basics to Build Real Cyber Resilience12:45 PM - 1:15 PMTheater 7
Breaking the Reactive Cycle: A Masterclass in Modern Cyber Security for MSPs12:45 PM - 1:15 PMTheater 6
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats1:00 PM - 1:30 PMGuided tours meeting point
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business2:00 PM - 2:30 PMGuided tours meeting point