About IT Attacks

Hotel Scandic Kødbyen, Copenhagen

27th May 2025

What is IT Attacks?

IT Attacks is Sweden’s premier cybersecurity conference for professionals at the front lines of defense. From new attack techniques to practical defense strategies, this event offers a comprehensive overview of today’s challenges and solutions in cybersecurity.

Why was the theme “Adaptive Cyber Defense” chosen?

In an era where cyber threats are constantly evolving and new attack techniques are emerging, organizations need to be flexible and prepared. This theme was chosen to inspire companies and security teams to adopt an adaptive approach that emphasizes anticipation, detection, and rapid response. The sessions are designed to provide practical solutions and forward-thinking ideas that address current challenges and the expanding threat landscape.

Why shouldn’t you miss this conference?

Because you’ll gain the most recent knowledge on cyber attacks, adaptive defenses, and innovative technologies. This conference brings together top experts, real-world case studies, and cutting-edge insights – everything you need to prepare your organization for the threats of tomorrow.

Topics that will be addressed

  • The anatomy of a modern Cyber Attack: Lessons from recent incidents
  • Zero Trust in action: A practical guide to implementation
  • Harnessing AI for proactive threat detection and defense
  • Cybersecurity for remote work: Ensuring safety beyond the office walls

Focus areas

  • Zero Trust architecture
  • Proactive threat detection and incident response
  • AI and machine learning in cybersecurity
  • Cloud security and compliance
  • Threat intelligence and behavioral analysis
  • Cybersecurity for SMEs
  • Endpoint security in hybrid work environments
  • Social engineering and awareness training
  • Compliance and privacy in EU regulations

Who is this conference for?

The IT Attacks conference is aimed at professionals responsible for the strategic and operational cybersecurity of their organisations, including:

  • CISOs
  • CTOs
  • Security Managers
  • IT Managers
  • Incident Response Specialists
  • Cyber Threat Analysts
  • Compliance Officers
  • Risk Managers
  • Digital Forensics Experts
  • Security Engineers

When can you participate for free?

  • You belong to the intended target audience as described on this page
  • You work with an organisation with at least 20 FTE
  • By agreeing with the registration conditions