Partners

IN PARTNERSHIP WITH

About ISACA
ISACA Denmark Chapter represents the international organization ISACA.ORG.
As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to achieve individual and organizational success.
Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.
With the ISACA COBIT framework, the CISA, CISM, CGEIT and CRISC certifications and the CSX certificate, ISACA brands are respected and used by these professionals for the benefit of their enterprises.

For more information: ISACA.ORG

About ICC
The CCI was born in 2013 from the industry, independent and non-profit.
It is the meeting point for professionals and entities -private and public– that work to improve the level of Cybersecurity in the industry. International reference for the exchange of experiences and knowledge, and the dynamization of the sectors involved in this field.
The CCI has formed the largest ecosystem of industrial organizations (end users), providers of industrial cybersecurity services and solutions, engineering companies, integrators, public organizations; but above all, to its professionals.

For more information: www.cci-es.org/en

About ICS Range
ICS Range: Learn better, faster and more efficient OT Security.
The ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems – ranging from basic introduction level to expert level education.
To limit the shortages of qualified OT security employees, access to the range is very simple: – just open a browser, enter credentials and access to the environment is ready within seconds.
The range is full of real-life industrial OT/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.

For more information: icsrange.com

About Egede ApS
Egede ApS was founded by Søren Egede Knudsen, who has over 25 years of experience in cybersecurity and networking. Søren has been dedicated to working with cybersecurity in the industrial sector since 2009.

Egede ApS focuses on cybersecurity within industrial systems and networks, also known as SCADA, OT (Operational Technology), or ICS (Industry Control Systems). These systems are used in many manufacturing companies and especially in critical infrastructure.

Areas within the industrial sector that are part of the regular work scope at Egede ApS include industrial penetration testing and analysis, cybersecurity design and consulting, and hardware analysis and evaluations—all within cybersecurity for the industrial sector for both management and technicians.

For more information about Egede ApS, contact Søren Egede Knudsen at www.egede.co

Om IT-Branchen
IT-Branchen hjælper hver dag vores medlemmer, branchen og samfundet med at vokse.
Vi brænder for at skabe et digitalt samfund for alle. Et samfund i vækst, og hvor Danmark står som et globalt fyrtårn, fordi vi udnytter teknologien til gavn for klimaet, økonomien og det enkelte menneske.
Vi lader ildsjælene hos vores medlemmer sætte retningen for en bedre fremtid. Det gavner Danmark, erhvervslivet, den enkelte borger og vores medlemsvirksomheder.

For mere information: www.itb.dk

PARTNERS 2025

About Advenica
Advenica’s expertise helps countries, authorities, companies and organisations protect the most important digital information. Our well-proven and trusted cybersecurity solutions isolate networks physically while connecting data securely. Since the start in 1993, we design, develop and manufacture all crypto and segmentation products in Sweden to ensure high assurance.
Read about our unique technology and its EU and national approvals at the highest security level at www.advenica.com

About Armis
Armis® is the leading unified asset visibility & security platform designed to address the new threat landscape created by connected devices. Fortune 1000 companies trust our real-time, continuous, and agentless protection to see all managed, unmanaged, and IoT devices with full context, including medical devices (IoMT), operational technology (OT) and industrial control systems (ICS).

For more information: www.armis.com

About Booz Allen
Booz Allen is the advanced technology company delivering outcomes with speed for America’s most critical defense, civil, and national security priorities. We build technology solutions using AI, cyber, and other cutting-edge technologies to advance and protect the nation and its citizens. By focusing on outcomes, we enable our people, clients, and their missions to succeed, accelerating the nation to realize our purpose: Empower People to Change the World®.

Cybersecurity Services for Business and Industry

About Claroty
Claroty has redefined CPS protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. Claroty provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection – whether in the cloud or on-premise. Backed by award-winning threat research and a breadth of technology alliances, Claroty enables organizations to effectively reduce CPS risk, with the fastest time-to-value and lower total cost of ownership. Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.

To learn more, visit claroty.com

About Comm2ig
Comm2ig is a full-service IT reseller, assisting with everything from the delivery and implementation of clients, licenses, AV, and security solutions, to comprehensive data center and cloud solutions. We deliver IT solutions to businesses of all sizes and are a supplier on a number of public framework agreements.

At Industrial Security Conference Copenhagen, Comm2ig is represented by our ChromeOS team. ChromeOS is a cloud-first operating system with built-in, proactive security. In fact, there have never been any reported ransomware attacks on devices running ChromeOS.

For more information: www.comm2ig.dk/chrome-os

About Cyolo
Cyolo is a leading cybersecurity innovator dedicated to providing cutting-edge access solutions for all environments and deployment scenarios. With a focus on security, operational agility, and user experience, Cyolo is fostering a transition from merely enabling access to empowering operations, productivity, and compliance with its Cyolo PRO (Privileged Remote Operations) solution.

For more information: cyolo.io

About Dediko
Dediko is a Danish cybersecurity company specializing in implementing SANS Top5 and CIS 18 controls in OT/ICS environments. With a focus on operational reliability and compliance, Dediko helps organizations strengthen their security infrastructure through targeted analyses, maturity assessments, and automated solutions. Dediko also provides advisory services to boards and executives, as well as tools to effectively manage cyber risks in critical infrastructure.

For more information: dediko.dk

About DNV Cyber
DNV Cyber is a leading cybersecurity services provider that empowers businesses with complex needs to become safer and more resilient. A global team of more than 500 experts brings over 30 years of IT and industrial control system security experience to help customers in multiple industry sectors breathe easier and perform better.

For more information: www.dnv.com/cyber

About Forescout
Forescout delivers automated cybersecurity across the digital enterprise, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, IoT, OT, IoMT. The Forescout Platform provides leading asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust.

For more information: www.forescout.com

About Fortinet
Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.

Learn more at www.fortinet.com, the Fortinet Blog, or FortiGuard Labs

About Gigamon
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived telemetry to your cloud, security, and observability tools, helping organizations eliminate security blind spots, reduce tool costs, and better secure and manage your hybrid cloud infrastructure. Gigamon goes beyond security and observability log-based approaches by extracting real-time network intelligence derived from packets, flows, and application metadata to deliver defence-in-depth and complete performance management. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.

To learn more, please visit gigamon.com

About ICS Range
ICS Range: Learn better, faster and more efficient OT Security.
The ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems – ranging from basic introduction level to expert level education.
To limit the shortages of qualified OT security employees, access to the range is very simple: – just open a browser, enter credentials and access to the environment is ready within seconds.
The range is full of real-life industrial OT/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.

For more information: icsrange.com

About Implement
When we founded Implement, our dream was to help people and organisations succeed with their most important change initiatives. It was a simple dream of moving something forward, to improve and create impact. To turn ambitions into reality. This will probably never change.
Today, after more than 20 years, we still aspire to be catalysts of real change and transformation, with an ambition of leaving every organisation that we touch, at a truly better place – more fit for humans and more fit for the future. Empowering every human and organisation to achieve more.
This foundation and ambition has implications. It’s not enough to point to a solution, to deliver a strategy and a plan for how to get there. In any encounter, we try to engage in a way that leverages the wisdom of the crowd and makes the organisation own the change for real. Interacting in a way that engages the hearts and minds, that makes the change-makers shine and grow in the process, so that we co-create sustainable impact fast.

For more information: www.implementconsultinggroup.com

About mnemonic
mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.
Our expert team of security consultants, product specialists, threat researchers, incident responders and ethical hackers, combined with our Argus security platform ensures we stay ahead of advanced cyberattacks and protect our customers from evolving threats.
Acknowledged by Gartner as a notable vendor in delivering Managed Detection and Response (MDR) services, threat intelligence and advanced targeted attack detection, we are among the largest IT security service providers in Europe, the preferred security partner of the region’s top companies and a trusted source of threat intelligence to Europol and other law enforcement agencies globally.
With intelligence-driven managed security services, 250+ security experts and partnerships with leading security vendors, mnemonic enables businesses to stay secure and compliant while reducing costs.

For more information: www.mnemonic.io

About Nozomi Networks
Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

For more information: www.nozominetworks.com

About Schneider Electric
Schneider’s purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and sustainability for all. At Schneider, we call this Life Is On.

Our mission is to be the trusted partner in Sustainability and Efficiency.

We are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart industries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep domain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation, software and services, delivering digital twins to enable profitable growth for our customers.

We are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries to ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our meaningful purpose of a sustainable future for all.

For more information: www.se.com

About Sectra
Sectra is a leading expert in cybersecurity with over a decade of experience in OT-security. Dedicated to supporting critical societal functions, the company provides security monitoring and risk analysis for systems vital to essential services such as electricity and water distribution. The company also develops highly secure communication systems with advanced encryption. Founded in 1978, Sectra is headquartered in Linköping, Sweden.

For more information: sectra.com

About Secudea
Consultancy: Do you need help with cybersecurity within industrial environments? Do you require assistance in setting security requirements and guidelines for green fields? We provide independent, business driven industrial security consultancy services.
Assessments: Want to have your industrial environment tested, validated or assessed? Do you want to know what risks there are in your current environment? Need to perform risk or maturity assessments? We can help you identifying your risks through our assessment services.
Training: Whether you would like to learn something new like how to perform hardening of systems within industrial environments or if you want to organize an awareness day on OT security in your organization, we can provide you real experience based training and coaching.

For more information: www.secudea.be

About Secure-NOK
Secure-NOK is a trusted leader within cybersecurity for OT. We develop the SNOK platform, a European developed monitoring solution for owners of industrial production facilities and critical infrastructure.

The SNOK platform offers a unique combination of network, endpoint and PLC sensors to detect early signs of cyber-attacks in OT. Our European based Security Center provides professional services, including intelligence-driven analytics to allow effective responses to cyber threats.

For more information: securenok.com

About SecuriOT
SecuriOT is specialized in cyber security for OT/ICS environments. As a company recognized for its high level of dedication to and expertise in the OT/ICS niche, SecuriOT is the “trusted advisor” and preferred partner for OT cyber security of organizations running critical infrastructure and critical control systems.

SecuriOT delivers a variety of recognized industry leading solutions, consultancy and services to help secure production systems (OT/ICS) against cyber threats. In addition to that SecuriOT has developed internationally recognized software tools supporting OT security teams in their risk assessment and management work.

An important foundation for SecuriOTs business approach is that OT-security is not just fixed with a quick analysis or a network component. It is a continuous process to ensure security at the right level, and it often requires a new mindset, greater visibility and a better understanding of the cyber threats against your company. This is where SecuriOT creates value for our customers. SecuriOT is a part of NOVOTEK Group.

For more information: www.securiOT.dk

About SensorFu
SensorFu provides automated verification of network isolation. Its Beacon technology continuously tests segmentation by sending controlled, non-intrusive signals across network boundaries to confirm that isolation rules are enforced. This proactive approach ensures that critical separations remain intact, reducing manual audits and improving security assurance in business-critical environments.

For more information: SensorFu.com

Cybersecurity at Siemens
Protect what you value – with a holistic approach and leading technology expertise.
With us you get a focus on the important entities affected by NIS 2 Directive, and we are continuously working on reinforcing the comprehensive protection among products, solutions, and services.

Building
Improve your building network security – with the latest developments in building protocols, through IT best practices and easy integration with existing IT infrastructure.

We ensure that our information security management systems (ISMS) adhere to the highest international standards. This includes ISO/IEC 27001 certification for our common Remote Service Platform (cRSP) and cloud-based data management platform, Navigator.

Grid
Security by design for your grid – to cope with the increasing demands in a scalable manner based on international standards.

Secure systems are vital for critical infrastructure. We offer well designed products, systems, and solutions to ensure the security of the energy infrastructure including stringent security requirements of the BDEW, IEC 62443, IEC 62351, and NERC CIP.

Industry
Proven concept securing your industry – from the operational to the field level and from the protection of data to secure communication.

With “Defense in Depth”, Siemens provides a multilayer security concept that gives plant operators, integrators, and component manufacturers all-round and in-depth protection as recommended by the international standard IEC 62443.

We draw on experience from our own production plants and incorporate the latest knowledge about cyber treats into our products and services and when necessary, Security Advisories also inform you of current threats to your company and any necessary updates to our products.

For more information: www.siemens.com/cybersecurity

About Truesec
Truesec is an international cybersecurity company that offers market-leading managed services, incident management, and expert consulting services. Truesec operates the largest Security Operations Center (SOC) in the Nordics and has conducted over 100,000 hours of incident management. The company’s goal is to prevent breaches and minimize impact. Since 2005, Truesec has delivered advanced security solutions to clients in both the private and public sectors worldwide, including critical infrastructure and operational technology environments that require specialized protection. Today, the company comprises 350+ cyber specialists with deep expertise and a leading role in cybersecurity in the Nordics.

For more information: Truesec.com

About TXOne Networks
TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. At TXOne Networks, we work together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time defense-in-depth manner.

For more information: www.txone.com

About Waterfall Security Solutions
Waterfall Security Solutions Ltd. Privately-owned since 2007, Waterfall Security has focused on protecting critical infrastructure and industrial control systems from online cyberattacks, becoming the leading cybersecurity vendor for industrial control systems (ICS) perimeter security. Waterfall Security’s technology enables safe and reliable IT/OT integration, remote monitoring and diagnostics, and advanced cloud services. Over the course of the last 30 years, connecting industrial control systems to the Internet and IT networks has become an essential part of business operations. This added connectivity provides many advantages to industrial engineers and to businesses overall, enabling real-time visibility into production systems and information. The emerging wave of the Industrial Internet of Things (IIoT) has taken hold, promising unparalleled growth and performance gains to industrial systems. However, the additional interconnectivity of numerous sensors and devices, greatly increases the potential attack surface for cyber crime, and the vulnerability of every connected industrial site. In addition, there has been a rapid growth both in the ‘class’ of attackers, as well as in their motivations to do harm. Modern attacks aim to disrupt production, cause downtime, demand ransomware, damage equipment, trigger environmental incidents, harm a company’s brand or target human lives.

For more information: waterfall-security.com

About Xage Security
Xage Security delivers Unified Zero Trust for Critical Systems to help protect organizations around the globe. The Xage Fabric enables secure remote access, privileged access management, and critical asset protection across IT, OT, cloud with identity-based controls that includes multi-layered access management and segmentation. Xage protects OT and IT systems without requiring network changes, helps to meet compliance requirements, and replaces VPNs, jump servers, and traditional PAM solutions.

For more information: xage.com

About XONA
XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

For more information: www.xonasystems.com