{"id":7209,"date":"2025-08-06T12:26:02","date_gmt":"2025-08-06T10:26:02","guid":{"rendered":"https:\/\/heliview.com\/state-cyber-security-denmark\/?page_id=7209"},"modified":"2026-02-10T09:43:21","modified_gmt":"2026-02-10T07:43:21","slug":"about-the-conference","status":"publish","type":"page","link":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/","title":{"rendered":"About the conference"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1704370505617{background-color: #f2f2f2 !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1704370464536{background-color: #f2f2f2 !important;}&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;60px&#8221;][vc_column_text css=&#8221;&#8221;]State of Cybersecurity is Denmarks premier cybersecurity conference for professionals at the front lines of defense. From new attack techniques to practical defense strategies, this event offers a comprehensive overview of today\u2019s challenges and solutions in cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=3JNcMqbywEw&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;lgx-inner lgx-inner-bottomgap&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Who is this conference for?<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The State of Cybersecurity Conference is aimed at professionals responsible for the strategic &amp; operational cybersecurity of their organizations including:<\/p>\n<ul class=\"checklist\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Chief Information Security Officers (CISO)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Business Information Security Officers (BISO)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Cyber Security Officers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Information Security Officers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Security Officers \/ Managers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Chief Security Officers (CSO)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Chief Risk Officers (CRO)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Risk Managers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Business Continuity Managers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Data Privacy Officers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Compliance Managers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Security Architects<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">Information managers<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Arial; font-size: 11.0pt;\">IT Managers<\/span><\/li>\n<\/ul>\n[\/vc_column_text][vc_empty_space height=&#8221;64px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">When can you participate for free?<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>You belong to the intended target audience as described on this page<\/li>\n<li>You work with an organisation with at least 20 FTE<\/li>\n<li>By agreeing with the registration conditions<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"lgx-brand-btn-area text-center\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"#\" target=\"_blank\"><span>Registration conditions<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1754481747207{background-color: #DBDBDB !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Topics that will be covered in the programme<\/h3>              \r\n              <\/div>[vc_tta_accordion active_section=&#8221;1&#8243; css=&#8221;.vc_custom_1754481759031{background-color: #DBDBDB !important;}&#8221;][vc_tta_section title=&#8221;Destabilizing societies or reducing competitiveness throught cyberattacks&#8221; tab_id=&#8221;1754479467406-fe7409ad-0fef&#8221;][vc_column_text css=&#8221;&#8221;]This remains a critical concern. Recent reports highlight the evolving nature of cyber threats, with state actors increasingly targeting critical infrastructure and digital services to disrupt societal functions and economic stability. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Current cyber attack: randssomware phising and DDoS&#8221; tab_id=&#8221;1754479467418-283cf2c4-7ce8&#8243;][vc_column_text css=&#8221;&#8221;]These threats continue to be prevalent. Ransomware attacks have become more sophisticated, often involving advanced persistent threats (APTs), while phishing campaigns are increasingly leveraging AI to craft convincing messages.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;NIS2 directive and regulatory compliance&#8221; tab_id=&#8221;1754479633831-f4496ed1-7ec8&#8243;][vc_column_text css=&#8221;&#8221;]Denmark is in the process of transposing the NIS2 Directive into national law through the proposed Cybersecurity Act. This legislation aims to enhance cybersecurity across 18 critical sectors, including energy, transport, and healthcare. It introduces stricter requirements for incident reporting, risk management, and supply chain security. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;AI in Cybersecurity&#8221; tab_id=&#8221;1754479681698-e5817531-95f1&#8243;][vc_column_text css=&#8221;&#8221;]AI is increasingly being integrated into cybersecurity strategies for threat detection, incident response, and predictive analytics. The European Commission has announced significant investments in AI and cybersecurity to bolster digital resilience.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Security architecture and Cloudsecurity&#8221; tab_id=&#8221;1754479720011-641d835c-c50c&#8221;][vc_column_text css=&#8221;&#8221;]With the rise of cloud services, securing cloud infrastructures has become paramount. The EU is working on a cybersecurity certification scheme for cloud services to ensure compliance with stringent privacy and data sovereignty requirements. \u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Denmark &amp; Geopolitical tensions&#8221; tab_id=&#8221;1754479794739-5b732a07-67fc&#8221;][vc_column_text css=&#8221;&#8221;]Denmark&#8217;s strategic position in Europe, with key roles in the EU and NATO, makes it a prime target for state-sponsored cyber espionage. Hackers may aim to steal intelligence on Swedish policies, military capabilities, or economic strategies. Sweden\u2019s prominence in tech and defense further increases its vulnerability to sophisticated cyberattacks. The current global geopolitical uncertainty\u2014marked by shifting alliances and rising tensions\u2014intensifies the risk, making Sweden\u2019s cybersecurity more critical than ever.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Public &#8211; private synergy&#8221; tab_id=&#8221;1754479840229-6c0f74ad-59b4&#8243;][vc_column_text css=&#8221;&#8221;]Collaboration between public authorities and private entities is essential for effective cybersecurity. Initiatives like information sharing, joint exercises, and coordinated response plans are being emphasized to enhance collective resilience.\u200b[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The human factor&#8221; tab_id=&#8221;1754480201392-08740961-ccdc&#8221;][vc_column_text css=&#8221;&#8221;]Human error remains a significant vulnerability. Training programs focusing on cybersecurity awareness, phishing simulations, and promoting a culture of security are crucial in reducing risks associated with the human factor.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;IAM as Strategic infrastructure: Governance, Compliance &amp; Business enablement&#8221; tab_id=&#8221;1754480235065-53fa03dc-540f&#8221;][vc_column_text css=&#8221;&#8221;]IAM isn\u2019t just a technical control \u2014 it\u2019s a strategic pillar. \u00a0IAM\u2019s role in enabling secure digital transformation, meeting regulatory demands like NIS2, and empowering business units through decentralized, governed access.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;100px&#8221;][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1704370505617{background-color: #f2f2f2 !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1704370464536{background-color: #f2f2f2 !important;}&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;60px&#8221;][vc_column_text css=&#8221;&#8221;]State of Cybersecurity is Denmarks premier cybersecurity conference for professionals at the front lines of defense. From new attack techniques to practical defense strategies, this event offers a comprehensive overview of today\u2019s challenges and solutions in cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=3JNcMqbywEw&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;lgx-inner lgx-inner-bottomgap&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7209","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>About the conference - State of Cybersecurity Denmark<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"About the conference - State of Cybersecurity Denmark\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1704370505617{background-color: #f2f2f2 !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1704370464536{background-color: #f2f2f2 !important;}&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;60px&#8221;][vc_column_text css=&#8221;&#8221;]State of Cybersecurity is Denmarks premier cybersecurity conference for professionals at the front lines of defense. From new attack techniques to practical defense strategies, this event offers a comprehensive overview of today\u2019s challenges and solutions in cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=3JNcMqbywEw&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;lgx-inner lgx-inner-bottomgap&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/\" \/>\r\n<meta property=\"og:site_name\" content=\"State of Cybersecurity Denmark\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-02-10T07:43:21+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuten\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/\",\"url\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/\",\"name\":\"About the conference - State of Cybersecurity Denmark\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/#website\"},\"datePublished\":\"2025-08-06T10:26:02+00:00\",\"dateModified\":\"2026-02-10T07:43:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About the conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/#website\",\"url\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/\",\"name\":\"State of Cybersecurity Denmark\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/state-cyber-security-denmark\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About the conference - State of Cybersecurity Denmark","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/","og_locale":"nl_NL","og_type":"article","og_title":"About the conference - State of Cybersecurity Denmark","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1704370505617{background-color: #f2f2f2 !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1704370464536{background-color: #f2f2f2 !important;}&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;60px&#8221;][vc_column_text css=&#8221;&#8221;]State of Cybersecurity is Denmarks premier cybersecurity conference for professionals at the front lines of defense. From new attack techniques to practical defense strategies, this event offers a comprehensive overview of today\u2019s challenges and solutions in cybersecurity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=3JNcMqbywEw&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;lgx-inner lgx-inner-bottomgap&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text [&hellip;]","og_url":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/","og_site_name":"State of Cybersecurity Denmark","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-02-10T07:43:21+00:00","twitter_card":"summary_large_image","twitter_site":"@HeliviewConf","twitter_misc":{"Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/","url":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/","name":"About the conference - State of Cybersecurity Denmark","isPartOf":{"@id":"https:\/\/heliview.com\/state-cyber-security-denmark\/#website"},"datePublished":"2025-08-06T10:26:02+00:00","dateModified":"2026-02-10T07:43:21+00:00","breadcrumb":{"@id":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/state-cyber-security-denmark\/about-the-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/state-cyber-security-denmark\/"},{"@type":"ListItem","position":2,"name":"About the conference"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/state-cyber-security-denmark\/#website","url":"https:\/\/heliview.com\/state-cyber-security-denmark\/","name":"State of Cybersecurity Denmark","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/state-cyber-security-denmark\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/pages\/7209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/comments?post=7209"}],"version-history":[{"count":5,"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/pages\/7209\/revisions"}],"predecessor-version":[{"id":7272,"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/pages\/7209\/revisions\/7272"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/state-cyber-security-denmark\/wp-json\/wp\/v2\/media?parent=7209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}