Partners
IN PARTNERSHIP WITH
About ISACA
ISACA Denmark Chapter represents the international organization ISACA.ORG.
As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to achieve individual and organizational success.
Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.
With the ISACA COBIT framework, the CISA, CISM, CGEIT and CRISC certifications and the CSX certificate, ISACA brands are respected and used by these professionals for the benefit of their enterprises.
For more information: ISACA.ORG
About ICC
The CCI was born in 2013 from the industry, independent and non-profit.
It is the meeting point for professionals and entities -private and public– that work to improve the level of Cybersecurity in the industry. International reference for the exchange of experiences and knowledge, and the dynamization of the sectors involved in this field.
The CCI has formed the largest ecosystem of industrial organizations (end users), providers of industrial cybersecurity services and solutions, engineering companies, integrators, public organizations; but above all, to its professionals.
For more information: www.cci-es.org/en
About ICS Range
ICS Range: Learn better, faster and more efficient OT Security.
The ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems – ranging from basic introduction level to expert level education.
To limit the shortages of qualified OT security employees, access to the range is very simple: – just open a browser, enter credentials and access to the environment is ready within seconds.
The range is full of real-life industrial OT/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.
For more information: icsrange.com
About Egede ApS
Egede ApS was founded by Søren Egede Knudsen, who has over 25 years of experience in cybersecurity and networking. Søren has been dedicated to working with cybersecurity in the industrial sector since 2009.
Egede ApS focuses on cybersecurity within industrial systems and networks, also known as SCADA, OT (Operational Technology), or ICS (Industry Control Systems). These systems are used in many manufacturing companies and especially in critical infrastructure.
Areas within the industrial sector that are part of the regular work scope at Egede ApS include industrial penetration testing and analysis, cybersecurity design and consulting, and hardware analysis and evaluations—all within cybersecurity for the industrial sector for both management and technicians.
For more information about Egede ApS, contact Søren Egede Knudsen at www.egede.co
Om IT-Branchen
IT-Branchen hjælper hver dag vores medlemmer, branchen og samfundet med at vokse.
Vi brænder for at skabe et digitalt samfund for alle. Et samfund i vækst, og hvor Danmark står som et globalt fyrtårn, fordi vi udnytter teknologien til gavn for klimaet, økonomien og det enkelte menneske.
Vi lader ildsjælene hos vores medlemmer sætte retningen for en bedre fremtid. Det gavner Danmark, erhvervslivet, den enkelte borger og vores medlemsvirksomheder.
For mere information: www.itb.dk
CONFIRMED PARTNERS 2024
About Advenica
Advenica’s expertise helps countries, authorities, companies and organisations protect the most important digital information. Our well-proven and trusted cybersecurity solutions isolate networks physically while connecting data securely. Since the start in 1993, we design, develop and manufacture all crypto and segmentation products in Sweden to ensure high assurance.
Read about our unique technology and its EU and national approvals at the highest security level at www.advenica.com
About Arbit Cyber Defence Systems
Arbit Cyber Defence Systems specializes in secure cross-domain solutions for high-security data transfers across government, intelligence, and defense. Trusted by security organizations across Europe, Arbit ensures strong protection by integrating with OPSWAT. This partnership helps securing critical infrastructure against evolving cyber threats, ensuring seamless and secure operations.
For more information: Arbit Cyber Defence Systems
About Armis
Armis® is the leading unified asset visibility & security platform designed to address the new threat landscape created by connected devices. Fortune 1000 companies trust our real-time, continuous, and agentless protection to see all managed, unmanaged, and IoT devices with full context, including medical devices (IoMT), operational technology (OT) and industrial control systems (ICS).
For more information: www.armis.com
About Cisco
Cisco (NASDAQ: CSCO) is a global leader in networking technology, driving innovation in the areas of networking, cybersecurity, collaboration, and cloud solutions. With a commitment to shaping the future of the internet, Cisco empowers organizations to securely connect and thrive in a digital world. Through its comprehensive portfolio of products and services, Cisco enables seamless communication, enhances productivity, and fosters digital transformation for businesses of all sizes.
For more information: Cisco.com
About Corelight
Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.
For more information: corelight.com
About Cyolo
Cyolo is a leading cybersecurity innovator dedicated to providing cutting-edge access solutions for all environments and deployment scenarios. With a focus on security, operational agility, and user experience, Cyolo is fostering a transition from merely enabling access to empowering operations, productivity, and compliance with its Cyolo PRO (Privileged Remote Operations) solution.
For more information: cyolo.io
About DNV
We are the independent expert in assurance and risk management. Driven by our purpose, to safeguard life, property and the environment, we empower our customers and their stakeholders with facts and reliable insights so that critical decisions can be made with confidence. As a trusted voice for many of the world’s most successful organizations, we use our knowledge to advance safety and performance, set industry benchmarks, and inspire and invent solutions to tackle global transformations.
We are the world’s leading classification society and a recognized advisor for the maritime industry. We deliver world-renowned testing, certification and technical advisory services to the energy value chain including renewables, oil and gas, and energy management. We are one of the world’s leading certification bodies, helping businesses assure the performance of their organizations, products, people, facilities and supply chains.
We are also a world-leading provider of digital solutions for managing risk and improving safety and asset performance for ships, pipelines, processing plants, offshore structures, electric grids, smart cities and more. Our open industry assurance platform Veracity, cyber security and software solutions support business-critical activities across many industries, including maritime, energy and healthcare.
For more information: www.dnv.com
About Dragos
Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos’s industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available.
For more information: www.dragos.com
About FM Approvals
FM Approvals offers international certification services for products related to property risk mitigation. Recognized and respected across the globe, our certification assures that a product has been objectively tested and conforms to rigorous property loss prevention standards.
FM APPROVED certification mark products adhere to the highest standards in quality, technical integrity, and performance.
For more information: www.fmapprovals.com
About Forescout
Forescout delivers automated cybersecurity across the digital enterprise, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, IoT, OT, IoMT. The Forescout Platform provides leading asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust.
For more information: www.forescout.com
About Fortinet
Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.
Learn more at www.fortinet.com, the Fortinet Blog, or FortiGuard Labs
About Google Cloud Security
Transform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation. With Google Cloud, you can prevent, detect, investigate and respond to security incidents before they impact your business, and build on the most trusted, secure cloud to drive your organization’s digital transformation.
For more information: cloud.google.com
About Implement
When we founded Implement, our dream was to help people and organisations succeed with their most important change initiatives. It was a simple dream of moving something forward, to improve and create impact. To turn ambitions into reality. This will probably never change.
Today, after more than 20 years, we still aspire to be catalysts of real change and transformation, with an ambition of leaving every organisation that we touch, at a truly better place – more fit for humans and more fit for the future. Empowering every human and organisation to achieve more.
This foundation and ambition has implications. It’s not enough to point to a solution, to deliver a strategy and a plan for how to get there. In any encounter, we try to engage in a way that leverages the wisdom of the crowd and makes the organisation own the change for real. Interacting in a way that engages the hearts and minds, that makes the change-makers shine and grow in the process, so that we co-create sustainable impact fast.
For more information: www.implementconsultinggroup.com
About Keysight Technologies
Keysight is at the forefront of technology innovation, delivering breakthroughs and trusted insights to the world’s visionaries and innovators in network security, electronic design, test, manufacturing, and optimization. We create world-class solutions in security, wireless communications, 5G, automotive, quantum, aerospace, defense and semiconductor markets in over 100 countries.
In 2016, Keysight transformed the company structure from product-focused divisions to industry-focused solution organizations, enabling closer customer alignment. This allows us to partner closely with market leaders to enable new technologies and provide first-to-market solutions for emerging applications. Our solution-centric industry groups provide end-to-end design, test and optimization solutions driven by customer specifications and timetables.
For more information: www.keysight.com
About mnemonic
mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.
Our expert team of security consultants, product specialists, threat researchers, incident responders and ethical hackers, combined with our Argus security platform ensures we stay ahead of advanced cyberattacks and protect our customers from evolving threats.
Acknowledged by Gartner as a notable vendor in delivering Managed Detection and Response (MDR) services, threat intelligence and advanced targeted attack detection, we are among the largest IT security service providers in Europe, the preferred security partner of the region’s top companies and a trusted source of threat intelligence to Europol and other law enforcement agencies globally.
With intelligence-driven managed security services, 250+ security experts and partnerships with leading security vendors, mnemonic enables businesses to stay secure and compliant while reducing costs.
For more information: www.mnemonic.io
About Nozomi Networks
Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.
For more information: www.nozominetworks.com
About OMICRON
OMICRON is a leading provider of cybersecurity solutions for power utility communication systems. We offer tailored cybersecurity solutions that are effective and meet the unique needs of these OT networks. With an overview of utility automation systems, we can assess power grid networks, identify risks and threats, and offer effective protection. Our experienced team is ready to assist in the event of a security incident and provide effective solutions to minimize the impact on your network.
For more information: www.omicroncybersecurity.com
About SANS Institute
SANS Institute is the world’s largest provider of cyber security training. For over twenty-five years, we’ve provided cutting edge training to governments and organisations across the world. Technology may have changed in that time, but our core mission has remained constant: to protect through sharing cyber security knowledge and skills. SANS offers over 60 cyber security courses, operates across dozens of countries and has over 200,000 alumni. SANS training is built around a promise: students will be able to put into practice what they’ve learned as soon as they get back to their desk.
For more information: www.sans.org
About Schneider Electric
Schneider’s purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and sustainability for all. At Schneider, we call this Life Is On.
Our mission is to be the trusted partner in Sustainability and Efficiency.
We are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart industries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep domain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation, software and services, delivering digital twins to enable profitable growth for our customers.
We are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries to ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our meaningful purpose of a sustainable future for all.
For more information: www.se.com
About Secolve
Secolve are the OT security specialists, partnering with organisations of all sizes to safeguard critical infrastructure from cyber threats. Our team of OT experts use a risk-based approach to tailor strategies to meet your unique needs. Cyber-attacks on critical infrastructure are on the rise and could have significant impacts for your organisation and surrounding community.
We built OT-SAT, a video-based training platform, for critical infrastructure teams to get cyber aware on-demand to suit their busy schedules.
Our training has been created by leading experts in the field and is already uplifting cyber security awareness in mining, manufacturing, and energy companies across Australia and globally.
For more information: www.secolve.com
About SecuriOT
SecuriOT is specialized in cyber security for OT/ICS environments.
As a company recognized for its high level of dedication to and expertise in the OT/ICS niche, SecuriOT is the “trusted advisor” and preferred partner for OT cyber security of organizations running critical infrastructure and critical control systems.
SecuriOT delivers a variety of recognized industry leading solutions, consultancy and services to help secure production systems (OT/ICS) against cyber threats.
In addition to that SecuriOT has developed internationally recognized software tools supporting OT security teams in their risk assessment and management work.
An important foundation for SecuriOTs business approach is that OT-security is not just fixed with a quick analysis or a network component. It is a continuous process to ensure security at the right level, and it often requires a new mindset, greater visibility and a better understanding of the cyber threats against your company.
This is where SecuriOT creates value for our customers.
SecuriOT is a part of NOVOTEK Group.
For more information: www.security.dk
Cybersecurity at Siemens
Protect what you value – with a holistic approach and leading technology expertise.
With us you get a focus on the important entities affected by NIS 2 Directive, and we are continuously working on reinforcing the comprehensive protection among products, solutions, and services.
Building
Improve your building network security – with the latest developments in building protocols, through IT best practices and easy integration with existing IT infrastructure.
We ensure that our information security management systems (ISMS) adhere to the highest international standards. This includes ISO/IEC 27001 certification for our common Remote Service Platform (cRSP) and cloud-based data management platform, Navigator.
Grid
Security by design for your grid – to cope with the increasing demands in a scalable manner based on international standards.
Secure systems are vital for critical infrastructure. We offer well designed products, systems, and solutions to ensure the security of the energy infrastructure including stringent security requirements of the BDEW, IEC 62443, IEC 62351, and NERC CIP.
Industry
Proven concept securing your industry – from the operational to the field level and from the protection of data to secure communication.
With “Defense in Depth”, Siemens provides a multilayer security concept that gives plant operators, integrators, and component manufacturers all-round and in-depth protection as recommended by the international standard IEC 62443.
We draw on experience from our own production plants and incorporate the latest knowledge about cyber treats into our products and services and when necessary, Security Advisories also inform you of current threats to your company and any necessary updates to our products.
For more information: www.siemens.com/cybersecurity
About Tenable
Tenable® is the Exposure Management company. More than 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable OT Security (formerly Tenable.ot) eliminates silos across IT Security and OT operations by centralizing visibility for both practices, enabling organizations to mitigate risk across their entire attack surface, including cyber physical systems.
For more information: www.tenable.com
About TXOne Networks
TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. At TXOne Networks, we work together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time defense-in-depth manner.
For more information: www.txone.com
About Waterfall Security Solutions
Waterfall Security Solutions Ltd. Privately-owned since 2007, Waterfall Security has focused on protecting critical infrastructure and industrial control systems from online cyberattacks, becoming the leading cybersecurity vendor for industrial control systems (ICS) perimeter security. Waterfall Security’s technology enables safe and reliable IT/OT integration, remote monitoring and diagnostics, and advanced cloud services. Over the course of the last 30 years, connecting industrial control systems to the Internet and IT networks has become an essential part of business operations. This added connectivity provides many advantages to industrial engineers and to businesses overall, enabling real-time visibility into production systems and information. The emerging wave of the Industrial Internet of Things (IIoT) has taken hold, promising unparalleled growth and performance gains to industrial systems. However, the additional interconnectivity of numerous sensors and devices, greatly increases the potential attack surface for cyber crime, and the vulnerability of every connected industrial site. In addition, there has been a rapid growth both in the ‘class’ of attackers, as well as in their motivations to do harm. Modern attacks aim to disrupt production, cause downtime, demand ransomware, damage equipment, trigger environmental incidents, harm a company’s brand or target human lives.
For more information: waterfall-security.com
About XONA
XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.
With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.
For more information: www.xonasystems.com
About Zscaler
Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange™ platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SSE-based Zero Trust Exchange™ is the world’s largest in-line cloud security platform.
For more information: www.zscaler.com