IDC Security Summit – Denmark

IDC Security Summit – Denmark

Security and Trust in the New AI World

Overview

The advancement of AI continues to impact corporate strategy as models and use-cases gain maturity and develop from beta-phase testing to full launch in active functions and applications. However, AI models and applications can increase cyber risk, exposing organizations to new security and privacy vulnerabilities that cyber attackers will seek to exploit. Additional to cyber threat, poorly implemented security and privacy governance in AI use cases will incur regulatory fines and potential loss of license to operate.

 

The implementation guidelines of NIS2, DORA, and the EU AI Act will all encourage businesses to establish robust AI governance practises, as well as address cyber risk and cyber resilience programs to ensure and maintain compliance. AI is also being used by cyber criminals to enhance their capabilities, which raises new challenges for security teams. Finally, security vendors continue to develop their own in-house AI models to layer on new and innovative features into security toolsets to augment security systems, such as automation in security operations, applied AI models in threat detection and IR, and more.

Why attend?

Join IDC’s analysts and security vendor thought leaders to learn about the latest trends in European cyber security, and the future of security in an AI-driven world.

Speakers

Want to become a speaker? Join Now!

David Clemente

David Clemente

Research Director, European Security

IDC

Read Bio

Roel Schouten

Roel Schouten

Vice President Information Security

Trivium Packaging

Read Bio

Thomas Wisbech

Thomas Wisbech

Technologist

Energinet

Read Bio

Eri Kejser

Eri Kejser

CISO

Force Technology

Read Bio

Jesper Langemark

Jesper Langemark

Partner

Bird & Bird

Read Bio

IDC Security Analysts

Mark Child

Mark Child

Associate Research Director, Security

IDC Europe

Read Bio

Joel Stradling

Joel Stradling

Research Director, Security

IDC Europe

Read Bio

Duncan Brown

Duncan Brown

Group Vice President, IDC Europe

IDC Europe

Read Bio

David Clemente

David Clemente

Research Director, European Security

IDC

Read Bio

Romain Fouchereau

Romain Fouchereau

Senior Research Manager

IDC

Read Bio

Partners

Knowledge Hub

Identity Security 2024: Mapping the Threats and Goals

The efficient management of identities and access has become central to digital business. It determines the speed and agility with which an organization is able to operate or pursue new goals; it underpins employee productivity and enables operational efficiencies; and it is key to security, privacy, and compliance. Most organizations have deployed identity and access management (IAM) solutions to handle their operational demands effectively.

Learn More

Ransomware in EMEA – The Threats and Defenses

Ransomware attacks have been one of the most high-profile scourges of business over the past decade — and the threat shows no signs of abating. If anything, it has become more prevalent as “ransomware as a service” has lowered the entry barrier for threat actors. Innovation by cybercriminals keeps security teams on high alert. When governments and security agencies advise organizations not to pay ransom, attackers may switch to extortionware approaches.

Learn More

The Critical Role of Governments in EU Cyber-Resilience

Cybersecurity threats continue to increase. According to ENISA’s 2023 Threat Landscape report, there were around 2,580 observed incidents in the EU between July 2022 and June 2023. In the previous reporting period, there were less than 800. ENISA reported that 19% of events targeted public administrations, by far the largest industry.

Learn More

Key Topics

Security Operations

Discover best practices and innovative strategies for managing security operations in a rapidly evolving threat landscape. Learn how to optimize your SOC for maximum efficiency and resilience.

Application and Cloud Security

Gain insights into securing applications and cloud environments, addressing vulnerabilities, and implementing robust security measures to protect critical assets.

Al in Cybersecurity

Explore the latest advancements in Al-driven security technologies, from threat detection to automated response systems. Understand the benefits and potential risks associated with Al in cybersecurity.

Network Security

Learn about the latest trends and technologies in network security, including zero trust architecture, next- gen firewalls, and intrusion detection systems.

Supply Chain Vulnerabilities

Identifying and mitigating risks associated with third-party vendors and suppliers.

2023 CISO Xchange highlight video

Venue

IDA Conference

IDA Conference

Kalvebod Brygge 31, 1560 København

Not the right event for you?

Don’t worry! There are plenty of other events to choose from. Simply sign up for event invitations and we’ll send you a notification whenever we add a new event that matches your interests.

Be Part of it!

Lorem ipsum dolor sit amet consectetur. Dui egestas in senectus suspendisse enim.Lorem ipsum dolor sit amet consectetur.

Register Now