
Reception and registration
Team Heliview Conferences & Training
Upon arrival, you will be warmly welcomed with coffee and tea, setting the tone for a comfortable and enjoyable event experience.

Signe Vadgaard
TV-vært og radiovært, moderator at DR - Danmarks Radio
Opening of the day and moderator of IT Attacks
Signe Vadgaard, TV-vært og radiovært, moderator at DR - Danmarks Radio
We are delighted to have Signe Vadgaard as the moderator for IT ATTACKS 2025 in Denmark. Her expertise and engaging presence will ensure an insightful and dynamic conference experience.



Leila Taghizadeh
Global Heaf of Cyber Risk and CISO IberoLatAm of Allianz Group
Keynote: The Dual Power of Cyber Risk and Compliance. Building an Organisation’s Risk Framework
Leila Taghizadeh, Global Heaf of Cyber Risk and CISO IberoLatAm of Allianz Group
In today’s rapidly evolving digital landscape, most if not all organisations face increasing cyber threats that put their (sensitive) information and (critical) systems at risk. Therefore, organisations must take the necessary steps towards understanding and managing their cyber risk. This can only be achieved by implementing an effective risk management framework. By building a risk framework and governance around it, organisations can ensure resilience and security as they will get a clearer view of their organisation’s risks, as it will involve all layers of their organisations, and it will allow senior management to have a clear overview of the organization’s exposure. Join us as we explore the importance of balancing regulation and cyber risk management in the era of cyber threats.

Coffee break including 1-to-1 meetings
Recharge with a fresh cup of coffee and some refreshments, ensuring you have plenty of energy throughout the day. Get acquainted with our unique concept and engage in conversations with other professionals and solution providers from the industry.
Discover our 1-on-1 concept!: You can choose who to meet with and when, allowing you to discuss the challenges you face within your organisation. Connect with the best solution providers and gain valuable insights.
Krzysztof Socha
Head of Sector – FORCE (Forensic Operations and Response to Cyber Events) at CERT-EU
AI-Driven Cybersecurity: Challenges and Opportunities
Krzysztof Socha, Head of Sector – FORCE (Forensic Operations and Response to Cyber Events) of CERT-EU
In this session, Krzysztof Socha, Head of Sector – FORCE (Forensic Operations and Response to Cyber Events) of CERT-EU, will provide an overview of the significant impact AI has on cybersecurity, exploring its dual role as both a protector and a threat. The discussion will cover the advancement of AI-driven security measures, which are becoming increasingly effective at anticipating and mitigating cyber threats, thereby enhancing the protection of essential data and infrastructure.
At the same time, the session will address the challenges posed by adversaries who utilize AI for sophisticated cyberattacks, adding new complexities to the security landscape. Participants will gain insights into how AI is reshaping the field, presenting both opportunities for enhanced defense and emerging risks.
Lunchbreak including 1-to-1 meetings
It’s time for a fully catered lunch to recharge your energy. Enjoy the finest catering while connecting with other participants or speakers. There will also be time to schedule more 1-on-1 meetings with industry leaders.
Enjoy!
Zero Trust in Action – A Practical Guide to Implementation
Zero Trust is no longer just a buzzword—it’s an essential security framework in today’s cyber threat landscape. However, many organizations struggle with its implementation. This session will provide a step-by-step guide to deploying a Zero Trust architecture, addressing key challenges such as identity verification, micro-segmentation, and continuous monitoring. Attendees will gain insights from real-world case studies and practical advice on integrating Zero Trust into existing IT environments.
Key Takeaways:
- How to move from traditional perimeter security to a Zero Trust model.
- Overcoming implementation challenges in complex IT environments.
- Best practices for ensuring continuous verification and least privilege access.
Harnessing AI for Proactive Threat Detection and Defense
AI is rapidly transforming both cyber defense and offense. While security teams use AI for threat detection, attackers leverage it for automated exploits and deepfake phishing. This session will examine how AI-driven security tools can provide proactive threat intelligence, anomaly detection, and automated response mechanisms. We will also address the ethical considerations of AI in cybersecurity and its future impact.
Key Takeaways:
- How AI enhances threat detection and real-time incident response.
- The double-edged sword: How adversaries exploit AI for cyberattacks.
- The future of AI-driven cybersecurity—what to expect in 2025 and beyond.
Afternoon break including 1-to-1 meetings
The final one-to-one meetings with our partners will take place.
Enjoy!
The Rise of Ransomware-as-a-Service – A Game Changer in Cybercrime
Ransomware-as-a-Service (RaaS) has revolutionized cybercrime, making advanced attack techniques accessible to even low-skilled threat actors. This session will explore how RaaS operates, the business model behind it, and real-world case studies of recent attacks. We will discuss why traditional security measures often fall short and provide actionable insights for CISOs and security managers on strengthening their organisation’s defenses.
Key Takeaways:
- Understanding the RaaS ecosystem and how it lowers the barrier for cybercriminals.
- Lessons learned from major RaaS-driven attacks in the past year.
- Defensive strategies, including Zero Trust and AI-driven detection.
Networking Reception
After a full day of learning and exchanging ideas, we conclude at 16:00, followed by a relaxed networking reception — the perfect opportunity to connect with peers and speakers alike.
A few of the topics that will be covered
- The Rise of Ransomware-as-a-Service (RaaS)
- Artificial Intelligence in Cyber Defense and Offense
- The Anatomy of a Modern Cyber Attack: Lessons from Recent Incidents
- Zero Trust in Action: A Practical Guide to Implementation
- Harnessing AI for Proactive Threat Detection and Defense
- The Future of IT Attacks: Trends Shaping Cybersecurity in 2025 and Beyond
- Strength in Unity: The Role of International Cooperation in Cybersecurity
- The Human Factor in Cybersecurity
- The Convergence of IT, OT, and IoT Security