{"id":7271,"date":"2024-11-11T17:31:07","date_gmt":"2024-11-11T15:31:07","guid":{"rendered":"https:\/\/heliview.com\/kmo-efacturatie-belgie\/?page_id=7271"},"modified":"2025-03-14T09:59:36","modified_gmt":"2025-03-14T07:59:36","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/it-attacks-denmark\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
[vc_row css=”.vc_custom_1704370920633{padding-top: 30px !important;background-color: #f2f2f2 !important;}” el_class=”lgx-inner”][vc_column][vc_cta h2=”Adaptive Cyber Defense” h4=”Staying ahead in a threat-driven world” color=”sky” add_button=”right” btn_title=”Claim a ticket” btn_color=”success” btn_align=”right” btn_i_icon_fontawesome=”fas fa-ticket-alt” css=”” btn_add_icon=”true” btn_link=”url:https%3A%2F%2Fheliview.com%2Fit-attacks-denmark%2Fregistration-closed%2F”]Attend the cyber security conference IT ATTACKS in Copenhagen. The forum where you meet the leading IT security specialists and learn how to stay protected from the cyber threats of today and tomorrow.<\/p>\n

The day kicks off at\u00a009:30<\/strong>\u00a0and offers a diverse program filled with inspiration, knowledge-sharing, and meaningful connections. Expect insightful\u00a0keynotes<\/strong>\u00a0from industry experts, complemented by interactive\u00a0workshops<\/strong>\u00a0and engaging\u00a0breakout sessions<\/strong>\u00a0tailored to your interests.<\/p>\n

After a full day of learning and exchanging ideas, we conclude at\u00a016:10<\/strong>, followed by a relaxed\u00a0networking reception<\/strong> \u2014 the perfect opportunity to connect with peers and speakers alike.\u00a0This promises to be a valuable day where knowledge meets collaboration, designed to leave you inspired and energized.[\/vc_cta][\/vc_column][\/vc_row][vc_row el_class=”custom-programma” css=”.vc_custom_1704370898301{background-color: #f2f2f2 !important;}”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Conference programme”][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″][vc_single_image image=”7527″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]

\r\n

Reception and registration<\/h2>\r\n

Team Heliview Conferences & Training<\/h3> \r\n <\/div>[vc_column_text css=””]Upon arrival, you will be warmly welcomed with coffee and tea, setting the tone for a comfortable and enjoyable event experience.<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″]\r\n\r\n
\r\n
\r\n \r\n \"Signe\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Signe Vadgaard<\/a><\/h3>\r\n

TV-v\u00e6rt og radiov\u00e6rt, moderator at DR - Danmarks Radio<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Opening of the day and moderator of IT Attacks<\/h2>\r\n

Signe Vadgaard, TV-v\u00e6rt og radiov\u00e6rt, moderator at DR - Danmarks Radio<\/h3> \r\n <\/div>[vc_column_text css=””]We are delighted to have Signe Vadgaard as the moderator for IT ATTACKS 2025 in Denmark. Her expertise and engaging presence will ensure an insightful and dynamic conference experience.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7523″ img_size=”” css=””][vc_single_image image=”7522″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″]\r\n\r\n
\r\n
\r\n \r\n \"Leila\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Leila Taghizadeh<\/a><\/h3>\r\n

Global Heaf of Cyber Risk and CISO IberoLatAm of Allianz Group<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Keynote: The Dual Power of Cyber Risk and Compliance. Building an Organisation\u2019s Risk Framework<\/h2>\r\n

Leila Taghizadeh, Global Heaf of Cyber Risk and CISO IberoLatAm of Allianz Group<\/h3> \r\n <\/div>[vc_column_text css=””]In today\u2019s rapidly evolving digital landscape, most if not all organisations face increasing cyber threats that put their (sensitive) information and (critical) systems at risk. Therefore, organisations must take the necessary steps towards understanding and managing their cyber risk. This can only be achieved by implementing an effective risk management framework. By building a risk framework and governance around it, organisations can ensure resilience and security as they will get a clearer view of their organisation\u2019s risks, as it will involve all layers of their organisations, and it will allow senior management to have a clear overview of the organization\u2019s exposure. Join us as we explore the importance of balancing regulation and cyber risk management in the era of cyber threats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7391″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″][vc_single_image image=”7530″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Coffee break including 1-to-1 meetings<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]Recharge with a fresh cup of coffee and some refreshments, ensuring you have plenty of energy throughout the day.\u00a0<\/strong>Get acquainted with our unique concept and engage in conversations with other professionals and solution providers from the industry.<\/p>\n

Discover our 1-on-1 concept!:\u00a0<\/strong>You can choose who to meet with and when, allowing you to discuss the challenges you face within your organisation. Connect with the best solution providers and gain valuable insights.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″]\r\n\r\n

\r\n
\r\n \r\n \"Krzysztof\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Krzysztof Socha<\/a><\/h3>\r\n

Head of Sector \u2013 FORCE (Forensic Operations and Response to Cyber Events) at CERT-EU<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

AI-Driven Cybersecurity: Challenges and Opportunities<\/h2>\r\n

Krzysztof Socha, Head of Sector \u2013 FORCE (Forensic Operations and Response to Cyber Events) of CERT-EU<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, Krzysztof Socha, Head of Sector \u2013 FORCE (Forensic Operations and Response to Cyber Events) of CERT-EU, will provide an overview of the significant impact AI has on cybersecurity, exploring its dual role as both a protector and a threat. The discussion will cover the advancement of AI-driven security measures, which are becoming increasingly effective at anticipating and mitigating cyber threats, thereby enhancing the protection of essential data and infrastructure.<\/p>\n

At the same time, the session will address the challenges posed by adversaries who utilize AI for sophisticated cyberattacks, adding new complexities to the security landscape. Participants will gain insights into how AI is reshaping the field, presenting both opportunities for enhanced defense and emerging risks.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7435″ img_size=”” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″][vc_single_image image=”7531″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]

\r\n

Lunchbreak including 1-to-1 meetings<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]It\u2019s time for a fully catered lunch to recharge your energy. Enjoy the finest catering while connecting with other participants or speakers. There will also be time to schedule more 1-on-1 meetings with industry leaders.<\/p>\n

Enjoy<\/strong>![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-4″][vc_single_image image=”7503″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]

\r\n

Zero Trust in Action \u2013 A Practical Guide to Implementation<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]\n

Zero Trust is no longer just a buzzword\u2014it\u2019s an essential security framework in today\u2019s cyber threat landscape. However, many organizations struggle with its implementation. This session will provide a step-by-step guide to deploying a Zero Trust architecture, addressing key challenges such as identity verification, micro-segmentation, and continuous monitoring. Attendees will gain insights from real-world case studies and practical advice on integrating Zero Trust into existing IT environments.<\/p>\n

Key Takeaways:<\/strong><\/p>\n