Partners

IN PARTNERSHIP WITH

About ISACA
ISACA Denmark Chapter represents the international organization ISACA.ORG.
As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to achieve individual and organizational success.
Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.
With the ISACA COBIT framework, the CISA, CISM, CGEIT and CRISC certifications and the CSX certificate, ISACA brands are respected and used by these professionals for the benefit of their enterprises.

For more information: ISACA.ORG

About ICC
The CCI was born in 2013 from the industry, independent and non-profit.
It is the meeting point for professionals and entities -private and public– that work to improve the level of Cybersecurity in the industry. International reference for the exchange of experiences and knowledge, and the dynamization of the sectors involved in this field.
The CCI has formed the largest ecosystem of industrial organizations (end users), providers of industrial cybersecurity services and solutions, engineering companies, integrators, public organizations; but above all, to its professionals.

For more information: www.cci-es.org/en

About ICS Range
ICS Range: Learn better, faster and more efficient OT Security.
The ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems – ranging from basic introduction level to expert level education.
To limit the shortages of qualified OT security employees, access to the range is very simple: – just open a browser, enter credentials and access to the environment is ready within seconds.
The range is full of real-life industrial OT/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.

For more information: icsrange.com

About Egede ApS
Egede ApS was founded by Søren Egede Knudsen, who has over 25 years of experience in cybersecurity and networking. Søren has been dedicated to working with cybersecurity in the industrial sector since 2009.

Egede ApS focuses on cybersecurity within industrial systems and networks, also known as SCADA, OT (Operational Technology), or ICS (Industry Control Systems). These systems are used in many manufacturing companies and especially in critical infrastructure.

Areas within the industrial sector that are part of the regular work scope at Egede ApS include industrial penetration testing and analysis, cybersecurity design and consulting, and hardware analysis and evaluations—all within cybersecurity for the industrial sector for both management and technicians.

For more information about Egede ApS, contact Søren Egede Knudsen at www.egede.co

Om IT-Branchen
IT-Branchen hjælper hver dag vores medlemmer, branchen og samfundet med at vokse.
Vi brænder for at skabe et digitalt samfund for alle. Et samfund i vækst, og hvor Danmark står som et globalt fyrtårn, fordi vi udnytter teknologien til gavn for klimaet, økonomien og det enkelte menneske.
Vi lader ildsjælene hos vores medlemmer sætte retningen for en bedre fremtid. Det gavner Danmark, erhvervslivet, den enkelte borger og vores medlemsvirksomheder.

For mere information: www.itb.dk

CONFIRMED PARTNERS 2024

About Advenica
Advenica’s expertise helps countries, authorities, companies and organisations protect the most important digital information. Our well-proven and trusted cybersecurity solutions isolate networks physically while connecting data securely. Since the start in 1993, we design, develop and manufacture all crypto and segmentation products in Sweden to ensure high assurance.
Read about our unique technology and its EU and national approvals at the highest security level at www.advenica.com

About Corelight
Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.

For more information: corelight.com

About Cyolo
Cyolo is a leading cybersecurity innovator dedicated to providing cutting-edge access solutions for all environments and deployment scenarios. With a focus on security, operational agility, and user experience, Cyolo is fostering a transition from merely enabling access to empowering operations, productivity, and compliance with its Cyolo PRO (Privileged Remote Operations) solution.

For more information: cyolo.io

About FM Approvals
FM Approvals offers international certification services for products related to property risk mitigation. Recognized and respected across the globe, our certification assures that a product has been objectively tested and conforms to rigorous property loss prevention standards.
FM APPROVED certification mark products adhere to the highest standards in quality, technical integrity, and performance.

For more information: www.fmapprovals.com

About Forescout
Forescout delivers automated cybersecurity across the digital enterprise, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, IoT, OT, IoMT. The Forescout Platform provides leading asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust.

For more information: www.forescout.com

About Fortinet
Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.

Learn more at www.fortinet.com, the Fortinet Blog, or FortiGuard Labs

About Implement
When we founded Implement, our dream was to help people and organisations succeed with their most important change initiatives. It was a simple dream of moving something forward, to improve and create impact. To turn ambitions into reality. This will probably never change.
Today, after more than 20 years, we still aspire to be catalysts of real change and transformation, with an ambition of leaving every organisation that we touch, at a truly better place – more fit for humans and more fit for the future. Empowering every human and organisation to achieve more.
This foundation and ambition has implications. It’s not enough to point to a solution, to deliver a strategy and a plan for how to get there. In any encounter, we try to engage in a way that leverages the wisdom of the crowd and makes the organisation own the change for real. Interacting in a way that engages the hearts and minds, that makes the change-makers shine and grow in the process, so that we co-create sustainable impact fast.

For more information: www.implementconsultinggroup.com

About mnemonic
mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.
Our expert team of security consultants, product specialists, threat researchers, incident responders and ethical hackers, combined with our Argus security platform ensures we stay ahead of advanced cyberattacks and protect our customers from evolving threats.
Acknowledged by Gartner as a notable vendor in delivering Managed Detection and Response (MDR) services, threat intelligence and advanced targeted attack detection, we are among the largest IT security service providers in Europe, the preferred security partner of the region’s top companies and a trusted source of threat intelligence to Europol and other law enforcement agencies globally.
With intelligence-driven managed security services, 250+ security experts and partnerships with leading security vendors, mnemonic enables businesses to stay secure and compliant while reducing costs.

For more information: www.mnemonic.io

About OMICRON
OMICRON is a leading provider of cybersecurity solutions for power utility communication systems. We offer tailored cybersecurity solutions that are effective and meet the unique needs of these OT networks. With an overview of utility automation systems, we can assess power grid networks, identify risks and threats, and offer effective protection. Our experienced team is ready to assist in the event of a security incident and provide effective solutions to minimize the impact on your network.

For more information: www.omicroncybersecurity.com

About SANS Institute
SANS Institute is the world’s largest provider of cyber security training. For over twenty-five years, we’ve provided cutting edge training to governments and organisations across the world. Technology may have changed in that time, but our core mission has remained constant: to protect through sharing cyber security knowledge and skills. SANS offers over 60 cyber security courses, operates across dozens of countries and has over 200,000 alumni. SANS training is built around a promise: students will be able to put into practice what they’ve learned as soon as they get back to their desk.

For more information: www.sans.org

About Tenable
Tenable® is the Exposure Management company. More than 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable OT Security (formerly Tenable.ot) eliminates silos across IT Security and OT operations by centralizing visibility for both practices, enabling organizations to mitigate risk across their entire attack surface, including cyber physical systems.

For more information: www.tenable.com

About TXOne Networks
TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. At TXOne Networks, we work together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time defense-in-depth manner.

For more information: www.txone.com

About Waterfall Security Solutions
Waterfall Security Solutions Ltd. Privately-owned since 2007, Waterfall Security has focused on protecting critical infrastructure and industrial control systems from online cyberattacks, becoming the leading cybersecurity vendor for industrial control systems (ICS) perimeter security. Waterfall Security’s technology enables safe and reliable IT/OT integration, remote monitoring and diagnostics, and advanced cloud services. Over the course of the last 30 years, connecting industrial control systems to the Internet and IT networks has become an essential part of business operations. This added connectivity provides many advantages to industrial engineers and to businesses overall, enabling real-time visibility into production systems and information. The emerging wave of the Industrial Internet of Things (IIoT) has taken hold, promising unparalleled growth and performance gains to industrial systems. However, the additional interconnectivity of numerous sensors and devices, greatly increases the potential attack surface for cyber crime, and the vulnerability of every connected industrial site. In addition, there has been a rapid growth both in the ‘class’ of attackers, as well as in their motivations to do harm. Modern attacks aim to disrupt production, cause downtime, demand ransomware, damage equipment, trigger environmental incidents, harm a company’s brand or target human lives.

For more information: waterfall-security.com

About XONA
XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

For more information: www.xonasystems.com