Program

Time Main Track Danish Track
8:00

Welcome – Registration, networking and breakfast

Register at the conference reception, receive your nametag, and conference material. Enjoy breakfast buffet with coffee and tea.

Velkommen til Industrial Security Conference

Udlevering af navneskilte og deltagermateriale. Ny en let morgenanretning med kaffe og te.
9:00

Introduction to the conference and today’s program

Chairman James R. McQuiggan, Security Awareness Advocate, KnowBe4 introduces the conference and today’s program.
James R. McQuiggan
Security Awareness Advocate, KnowBe4

Introduktion til konferencen og dagens program

Introduktion ved ordstyrer Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark
Peter Frøkjær
Senior Security Architect, Vestas, & President, ISACA Denmark
9:05

Strengthening Governance, Risk and Compliance in OT Security

Technical Level: Intermediate

In this presentation, we will discuss how to identify OT Cyber-Physical Risks and build a resilient compliance frameworks that are not a one-time effort, but a continuous process. In this session, we will explore best practices for ongoing monitoring, risk assessment, and mitigation – integrating compliance checks designed to help ensure that organizations stay ahead of both regulatory changes and the shifting threat landscape.
Saltanat Mashirova
OT Cybersecurity Lead, CPX

Beredskab og beskyttelse af dansk kritisk infrastruktur

Torsten Schack Pedersen
Minister for samfundssikkerhed og beredskab, Ministeriet for Samfundssikkerhed og Beredskab
9:30

Netværkspause med forfriskninger

9:50

Short Break

10:00

Safety-Critical Cloud-Based Systems – a survey of design options

Technical Level: Advanced

Delegates will learn; Key risks in cloud and AI-based safety-critical systems, design patterns to mitigate these risks and security trade-offs and recommendations for different criticality levels
Andrew Ginter
VP Industrial Security, Waterfall Security

Hvad er truslen mod den danske kritiske infrastruktur?

Jakob Witt
Sektionschef, Trusselsvurderingsenheden, Styrelsen for Samfundssikkerhed
10:40

Refreshments and networking

11:10

Implementing Secure-By-Design Frameworks in OT Environments

Technical Level: Intermediate

In this session, we will discuss the importance of OT security-by-design, how security should be injected throughout the production lifecycle, and share a case study and lessons learned from a recent real-world implementation.
Hatteras Hoops
OT Security Delivery Lead, Europe, Booz Allen

Tilsynserfaringer på baggrund af Energistyrelsens implementering af NIS2

Jesper Rode Tholstrup
Kontorchef, Energistyrelsen
11:50

Mastering OT Decryption Before It’s Too Late

Technical Level: Intermediate / Advanced

You will learn why decryption is essential for modern OT networks, how to address the visibility blind spots introduced by encrypted traffic, common misconceptions about OT Decryption and actionable strategies for implementing decryption without compromising uptime or performance.
Neil Wilkins
EMEA Technical Manager, Garland Technology

Cyber Resilience Act: Juridiske krav og compliance

Cyber Resilience Act (CRA) er en ny EU-forordning, der stiller juridiske krav til Cybersikkerheden i digitale produkter og tjenester, der gøres tilgængelige i EU. I oplægget får du en gennemgang af de juridiske krav i CRA, med fokus på hvilke produkter og tjenester, der er omfattet, og hvordan virksomheder skal sikre compliance, f.eks. i forhold til kravene til dokumentation, risikostyring, sikkerhedsopdateringer og leverandørstyring.
Emil Bisgaard
Partner, Poul Schmidt / Kammeradvokaten
12:30

Lunch and networking

13:30

Is the energy sector Cyber Secure in 2025?

Technical Level: Beginner

This is DNV’s third Energy Cyber Priority report. Research was carried out between September 2024 and January 2025. Survey respondents represent a range of functions within the industry, including those with in-depth knowledge of cybersecurity along with general managers and C-suite executives.
Boye Tranum
Director Cyber Security, DNV Cyber

Erfaringer fra et ransomware angreb fra en kommune

Karl Johansen, borgmester i Klaksvik Kommune på Færøerne, fortæller om oplevelsen af, hvordan det var at blive angrebet af ransomware. Annilisa Arge Klevang, chefkonsulent, Nordatlanten hos Samsik fortæller om truslen af ransomware, hvordan hackerne brød ind, og hvad man kan gøre for at reducere risikoen for ransomware.
Karl Johansen
Borgmester, Klaksvík Kommune
Annilisa Arge Klevang
Chefkonsulent, Nordatlanten, Styrelsen for Samfundssikkerhed
14:10

Short break

14:20

Challenges in Bringing Cybersecurity to Rail Operational Systems

Technical Level: Beginner

You will gain a foundational understanding of the rail-specific threat landscape and learn how tailored cybersecurity strategies can improve resilience across the industry.
Omar Benjumea
Field CISO & Business Development, Cylus

Fra rapportering til teknisk løsning

Technical Level: Intermediate

Erfaring fra Danmarks første CVE Numbering Authority (CNA) med opbygning af et centralt kontaktpunkt, hvor oplysninger om sårbarheder i producentens produkt kan indberettes og modtages på en sikker måde.
Anette Svendsen
Compliance Manager, Secomea
15:00

Refreshments and networking

15:25

Seeing the forest for the trees – Tracking the evolution of 15 years of malicious behavior on OT/ICS

Technical Level: Intermediate

Fifteen years after Stuxnet, OT/ICS threats have evolved far beyond state-sponsored malware. This session tracks the broader landscape of malicious activity, from ransomware on engineering workstations to botnets targeting industrial routers. Using new data from honeypots and malware repositories, we highlight the real-world threats asset owners face today—often overlooked in favor of high-profile attacks. Learn how attackers exploit perimeter devices, abuse OT protocols, wipe critical data, and infect legitimate OT software.
Daniel dos Santos
Head of Research, Forescout

Hvordan kan vi sikre Cyber resiliens i vores elnet – nu og i fremtiden?

Technical Level: Beginner/Intermediate

I denne session vil Amalie Lønning fra Siemens præsentere nogle af de største udfordringer, som fremtiden kigger ind i såsom det aktuelle trusselsbillede der er ved at arbejde med både de gamle og de nye elnet. Du får også et hurtigt realitetstjek af udviklingen i konvergensen mellem OT og IT, som er en forudsætning for cybersikkerhed og hovedresultaterne fra en bredere undersøgelse: Hvor langt er man med cybersikkerhed hos DSO'er og TSO'er i Norden?
Amalie Lønning
Cybersecurity Portfolio Manager - Nordics, Siemens
16:05

Short break

16:15

Imposing a Cost on the Adversary, not yourself

Technical Level: Intermediate

The realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes. How to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets? This talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost). Delegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.
Umberto Cattaneo
Europe Regional Cyber Security Business Consultant Lead, Schneider Electric

Kenneth og OT-sikkerhedsmonopolet

Vi hjælper dig med dit OT-sikkerheds dilemma – LIVE ON STAGE … det bedste dilemma premieres!
Rene Levin
CISO, Fjernvarme Fyn
Mikael Vingaard
Senior OT Security Consultant, ICSRange
Morten Kromann
Head of Product Development Special Projects, Grundfos
Jens Christian Vedersø
Head of Cyber Risk Management, Vestas
Kenneth B. Jørgensen
Owner, KCERT
17:00

The chairman provides a summary of the day’s agenda and key learning outcomes

James R. McQuiggan
Security Awareness Advocate, KnowBe4

Ordstyreren samler op på konferencens første dag

Peter Frøkjær
Senior Security Architect, Vestas, & President, ISACA Denmark
17:10

Networking reception

A networking reception with refreshments, offering the opportunity to connect with our partners.
Time Main Track Workshop 1 Workshop 2
8:00

Welcome to Day 2 at ISC-CPH

Enjoy a light breakfast buffet, coffee, tea and network with your security colleagues.
9:00

Introduction to today’s program

Chairman James R. McQuiggan, Security Awareness Advocate, KnowBe4 introduces today’s program.
James R. McQuiggan
Security Awareness Advocate, KnowBe4
9:10

Hunting at scale, identifying Internet connected OT devices

Technical Level: Intermediate

You'll walk away with new insights on the vast number of OT-species out there, and why we believe they should migrate away from the internet. Are you ready to join the expedition?
Erwin Paternotte
Senior Technical Threat Analyst, NCSC-NL
Niels van Eijck
Senior Technical Threat Analyst, NCSC-NL

Workshop: Expanding the Horizon of IDS

Technical Level: Beginner/Intermediate

This workshop provides a hands-on introduction to Intrusion Detection Systems (IDS), focusing on network-based IDS (NIDS). In this session you will get an introduction to IDS.
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
9:50

Short break

10:00

Study on High Impact Scenarios with ESCIM

Technical Level: Intermediate

Learn how ESCIM supports training, incident preparedness, and alignment with the NIST framework for effective response and recovery.
Maite Carli García
Communication Manager & European CCI Coordinator, CCI – Industrial Cybersecurity Center

Workshop 1: OT Network Segmentation – From Planning to Implementation

Technical Level: Intermediate

Workshop Overview: This full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.
Tony Turner
VP of Product, Frenos

Lab 1 – Setting Up a Basic IDS

Key takeaways: Installing and configuring Zeek, installing and configuring Suricata, installing and configuring ELK and preliminary testing
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
10:40

Refreshments and networking

11:10

Smart Systems, Smarter Threats

Technical Level: Beginner

Key insights include shifting from domain-based risk to business-driven criticality, building a shared risk language, and creating adaptive, audit-ready processes that are both practical and strategic.
Hedvig Måreng
OT Security Consultant, Ørsted

Requirements Development and Resource Planning

Key takeaways: Developing technical requirements for OT firewalls based on operational needs, performance considerations for industrial environments, staffing and skills assessment for implementation and maintenance and budgeting and procurement considerations.
Tony Turner
VP of Product, Frenos

Theory – Analyzing IDS Logs & Alerts

Key takeaways: Generating alerts with simulated attacks, generating logs via PCAPs, understanding Snort and Suricata alert logs, analyzing Zeek logs for deeper network insights and visualizing results in Kibana
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
11:50

Emergency Response Drills in Practice for Power Generation

Technical Level: Beginner

In the talk we will give you insight to why we did it, how we did it, pros vs cons and key learnings.
Lars Erik Smevold
Security & Process Control Architect, Statkraft

Project Planning and Communication

Keytakeaways: Creating an implementation roadmap with realistic milestones, identifying and managing stakeholders across IT and OT domainsm developing communication plans for technical and non-technical audiences and change management strategies for security implementations in OT
Tony Turner
VP of Product, Frenos

Lab 2: Traffic Analysis with Zeek

Key Takeaways: Case 1 Presentation, extracting and analyzing HTTP, DNS, and SSH activity and identifying suspicious patterns in logs
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
12:30

Lunch and networking

13:30

Staying on course in a volatile environment: OT security in complex large-scale HVDC projects – a real-life example

Technical Level: Intermediate

Learn how Amprion develops and adapts OT security requirements, integrates new regulations mid-project, and addresses the complexity of unmanned offshore stations. Real-world lessons and project management insights will be shared from the BorWin4/DolWin4 and BalWin1/BalWin2 initiatives.
Simon Gustafson
Information Security Manager, Amprion GmbH
Jan Grotelüschen
Senior Consultant, GAI NetConsult GmbH

Workshop 2: Hands-On Implementation Lab

Technical hands-on session for security practitioners. Key takeaways: Lab Environment Setup and Baseline Configuration
Tony Turner
VP of Product, Frenos

Theory – Advanced IDS Techniques

Key takeaways: Customizing IDS rules, advanced rules: sticky buffers/preprocessors and how they work, asset identification, optimizing rules and bypassing and evading IDS
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
14:10

Short Break

14:20

You’ve Scored It – Now What? Data Needs for Effective Remediation

Technical Level: Intermediate

This session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.
Kylie McClanahan
CTO, Bastazo

Protocol-Specific Rule Implementation

Key takeaways: Analyzing and configuring rules for common industrial protocols, implementing deep packet inspection for industrial protocols, configuring stateful inspection for TCP/IP-based communications and creating exceptions for legacy systems and protocols
Tony Turner
VP of Product, Frenos

Lab 3: Threat Hunting with IDS

Key Takeaways: Case 2 Presentation, simulating real-world attacks, investigating alerts and updating rules and correlating IDS logs with external threat intelligence
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
15:00

Refreshments and networking

15:25

Battling Cyber Threats and Addressing Evolving Regulation: A Harmonized Strategy for Safeguarding Battery Energy Storage Systems

Technical Level: Beginner/Intermediate

This presentation will provide an overview of the complexity in cyberspace, the cybersecurity challenges faced by battery energy storage systems, and opportunities for solutions through cybersecurity, engineering and supply chain controls.
Katherine Hutton
Product Manager, Cybersecurity, Fluence

Testing and Validation

Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection.
Tony Turner
VP of Product, Frenos

Theory – Performance

Key Takeaways: IDS general considerations and Dalton analysis
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
16:05

Short Break

16:15

OT systems migration, virtualisation and re-engineering under enemy fire

Technical Level: Intermediate

At the beginning of the Russian invasion in Ukraine, many critical systems that were expected to be priority targets have been moved… elsewhere. This session will analyse experience of migrating critical systems away ASAP under fire, based on experience in Ukrainian power grid, telcos, defence – ranging from simple lift-and-shift to massive re-engineering. More importantly, we will look at how these systems in their new states evolved over last 2-3 years, which important challenges had to be addressed and what to prepare for in critical situations like Ukrainian CNI operators had to face.
Eugene Pilyankevich
CTO, Cossack Labs

Wrap-up & Q&A

Recap of key takeaways, next steps: fine-tuning IDS, integrating with SIEM and resources for further learning
K. Reid Wightman
Vulnerability Researcher, Dragos
Oscar Delgado
Senior Industrial Consultant, Dragos
16:55

The chairman provides a summary of the day’s agenda and key learning outcomes

James R. McQuiggan
Security Awareness Advocate, KnowBe4
17:10

Walk & Talk

Choose between 5 security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers.
18:10

Networking reception

A networking reception with refreshments, offering the opportunity to connect with our partners.
Time Main Track Workshop 1 Workshop 2
8:00

Welcome to Day 3 at ISC-CPH

Enjoy a light breakfast buffet, coffee, tea and network with your security colleagues.
9:00

Chairman James R. McQuiggan introduces today’s program

James R. McQuiggan
Security Awareness Advocate, KnowBe4
9:10

Hazard Analysis: A Critical Systems Study on Passenger Ropeways

Technical Level: Intermediate

Explore the safety implications of modernizing automation in chairlift systems through a case study of passenger ropeways. Topics include system interdependencies, AI/ML impacts, IT data flows, lifecycle and supply chain considerations. Discussion will also include the effects of energy efficiency and carbon reduction efforts on safety systems. Learn practical strategies for integrating modern tech while maintaining regulatory compliance and operational safety.
Sean R. Bouchard
CEO, XenonCyber Dynamics

Workshop 1: Based on network visibility, what can we learn about activity of interest

Technical Level: Intermediate

In the first part of this workshop, we will walk through investigative examples then explain the background behind network objects allowing for their further investigation
Joe Slowik
Director, Cybersecurity Alerting Strategy, Dataminr

Workshop 1: Secure Communication with OPC UA

Technical Level: Intermediate

This hands-on workshop offers a deep dive into OPC UA and its role in enabling secure communication in industrial environments. Participants will learn how to configure OPC UA for secure data exchange and experience the difference firsthand through practical exercises.
Kenneth B. Jørgensen
Owner, KCERT
Jesper Kristiansen
Technology Specialist, Siemens
9:50

Short Break

10:00

Lessons learned from OT incident response

Technical Level: Beginner/Intermediate

In this talk, we will cover the similarities between IT and OT incident response, the unique considerations for IR in OT environments, and proactive steps that you or your teams can do to prepare for an OT incident.
Marie Moe
Principal Consultant, Mandiant, Google Cloud

Based on network visibility, what can we learn about activity of interest

In the second part of the workshop, we will dig into more complicated examples and highlight various resources that can be used to enrich and analyze network objects.
Joe Slowik
Director, Cybersecurity Alerting Strategy, Dataminr

Secure Communication with OPC UA

Key Takeaways: Hands-on, encrypted OPC-UA visibility and Round up. Part 2 of the workshop: Secure Communication with OPC UA.
Kenneth B. Jørgensen
Owner, KCERT
Jesper Kristiansen
Technology Specialist, Siemens
10:40

Refreshments and networking

11:10

Breaking Without Bricking: Safe Vulnerability Research in OT Environments

Technical Level: Beginner/Intermediate

You will gain a new insight combined with a practical demonstration of why some previous restraints may be overcome by using this approach.
Mikael Vingaard
Senior OT Security Consultant, ICSRange
Jens Nielsen
Senior OT Security Researcher, ICSRange

Workshop 2: Understanding OT Networks & Unfold the OT Network Jungle

Technical Level: Intermediate

This training focuses on the dynamic nature of OT networks and how to improve visibility using practical, open-source tools. Participants will learn how to identify devices, map data flows, and spot blind spots in OT environments.
Martin Scheu
OT Security Engineer, Switch

Workshop 2: Hardening for ICS – How to reduce attack vectors

Technical Level: Intermediate

This workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors.
Dieter Sarrazyn
Industrial Security Advisor, Secudea
11:50

Lunch and networking

12:50

Impowering women in cybersecurity

Saltanat Mashirova will lead a panel this year with focus on Impowering women in cybersecurity
Anette Svendsen
Compliance Manager, Secomea
Katherine Hutton
Product Manager, Cybersecurity, Fluence
Marie Moe
Principal Consultant, Mandiant, Google Cloud
Kylie McClanahan
CTO, Bastazo
Saltanat Mashirova
OT Cybersecurity Lead, CPX

OT Network Security Monitoring

Key takeaways: Risk based approach to choosing monitoring points, collect and forward traffic, Inter-zone visibility, IT/OT bridge, edge device discovery, outside view, OT Network Security Monitoring and its limits and testing and validating. second part of the workshop: Understanding OT Networks & Unfold the OT Network Jungle
Martin Scheu
OT Security Engineer, Switch

Hardening for ICS – how to reduce attack vectors

Part 2. Key takeaways: Hardening step by step – starting from backup to a basic hardened system and Lab – Hardening preparation & basic hardening
Dieter Sarrazyn
Industrial Security Advisor, Secudea
13:30

Refreshments and networking

13:55

Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure

Technical Level: Intermediate / Advanced

Attendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.
Nicklas Keijser
OT lead - Detection Services, Truesec

Getting started with OT Network Security Monitoring

Key takeaways: The cycle: use case definition, detection, alerting, playbook creation, tuning, techniques to discover assets and communication patterns and testing and validating. third part of the workshop: Understanding OT Networks & Unfold the OT Network Jungle
Martin Scheu
OT Security Engineer, Switch

Hardening for ICS – how to reduce attack vectors

Part 3. Key takeaways: Hardening step by step – securing the network side and Lab – implementing hardening settings on the network side
Dieter Sarrazyn
Industrial Security Advisor, Secudea
14:30

Short Break

14:35

Unsolicited Advice on OT Pentesting

Technical Level: Intermediate

OT penetration test feels like a buzzword. Many people talk about it, but only a few know what it should cover. And this is not an accident. The traditional IT penetration test does not translate directly to OT because of the risks it involves, which can be accepted in IT but can be catastrophic in OT. I spent a lot of time researching this question during my 9 years as a penetration tester at Siemens, and as a threat intel and malware researcher at Fortinet. In this presentation I would like to share my approach on how penetration testing can be translated to OT. My goal was to deliver the same value but decrease the risk it involves. I recommend a set of different security assessments on different layers that allow us to have control over the risks but deliver similar or even better results than a penetration test. Learnings for delegates: - The reason IT pretests cannot be done in OT. - Challenges of OT pentests. - An alternative strategy to get the same value with less risk. - Tips and Tricks around OT pentest.
Geri Révay
Principal Security Researcher, Fortinet

Hardening for ICS – how to reduce attack vectors

Part 4. Key takeaways: Hardening step by step – Further securing the users and the system … playing with (group) policies and Lab – implementing further hardening settings using policies
Dieter Sarrazyn
Industrial Security Advisor, Secudea
15:15

End of the Capture-the-flag competition

A short overview and status and award ceremony to the top 3 teams.
15:30
15:40

The conference ends – See you next year!