{"id":150,"date":"2021-08-26T14:57:19","date_gmt":"2021-08-26T12:57:19","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?page_id=150"},"modified":"2026-03-13T16:04:11","modified_gmt":"2026-03-13T15:04:11","slug":"partners","status":"publish","type":"page","link":"https:\/\/insightevents.dk\/isc-cph\/partners\/","title":{"rendered":"Partners"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_empty_space]<div class=\"wpb_content_element \"><style type=\"text\/css\">#ut_header_69e7b10735ffc h1.section-title{ font-family:Poppins;font-weight:400;font-style:normal; }#ut_header_69e7b10735ffc h1.section-title { font-size: 40px; }@media (min-width: 768px) { #ut_header_69e7b10735ffc h1 { line-height: 40px !important; } }<\/style><header id=\"ut_header_69e7b10735ffc\" class=\"section-header ut-no-title-linebreak-mobile ut-no-lead-linebreak-mobile pt-style-7 header-center header-tablet-center header-mobile-center element-with-custom-line-height\"><div class=\"element-with-custom-line-height\" ><h1 data-title=\"Partners\"  class=\"section-title  \"><span>Partners<\/span><\/h1><\/div><\/header><\/div>[vc_empty_space height=&#8221;30px&#8221;][ut_title_divider_2 divider=&#8221;bklyn-divider-style-3&#8243; align=&#8221;center&#8221; color=&#8221;#f9922d&#8221;]IN PARTNERSHIP WITH[\/ut_title_divider_2][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658755576889{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073678f { opacity: 1; }#ut_am_wrap_69e7b10736790 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10736790 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10736790 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10736790 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10736790 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10736790\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10736791\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/engage.isaca.org\/denmarkchapter\/home\" ><div class=\"ut-animated-image-zoom\"><img loading=\"lazy\" decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073678f\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 104'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/ISACA-Denmark_300x104px.jpg\" width=\"300\" height=\"104\" alt=\"ISACA Denmark Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About ISACA<\/strong><br \/>\nISACA Denmark Chapter represents the international organization <strong><a href=\"https:\/\/engage.isaca.org\/denmarkchapter\/home\" target=\"_blank\" rel=\"noopener noreferrer\">ISACA.ORG<\/a><\/strong>.<br \/>\nAs a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to achieve individual and organizational success.<br \/>\nThrough its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.<br \/>\nWith the ISACA COBIT framework, the CISA, CISM, CGEIT and CRISC certifications and the CSX certificate, ISACA brands are respected and used by these professionals for the benefit of their enterprises.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/engage.isaca.org\/denmarkchapter\/home\" target=\"_blank\" rel=\"noopener noreferrer\">ISACA.ORG<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658755045442{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10736ae8 { opacity: 1; }#ut_am_wrap_69e7b10736ae9 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10736ae9 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10736ae9 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10736ae9 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10736ae9 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10736ae9\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10736aea\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.cci-es.org\/en\/\" ><div class=\"ut-animated-image-zoom\"><img loading=\"lazy\" decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10736ae8\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 350 120'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/CCI_350x120px.png\" width=\"350\" height=\"120\" alt=\"Industrial Cybersecurity Center Industrial Cybersecurity Center is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About ICC<\/strong><br \/>\nThe CCI was born in 2013 from the industry, independent and non-profit.<br \/>\nIt is the meeting point for professionals and entities -private and public\u2013 that work to improve the level of Cybersecurity in the industry. International reference for the exchange of experiences and knowledge, and the dynamization of the sectors involved in this field.<br \/>\nThe CCI has formed the largest ecosystem of industrial organizations (end users), providers of industrial cybersecurity services and solutions, engineering companies, integrators, public organizations; but above all, to its professionals.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.cci-es.org\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.cci-es.org\/en<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754254269{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10736e50 { opacity: 1; }#ut_am_wrap_69e7b10736e51 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10736e51 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10736e51 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10736e51 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10736e51 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10736e51\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10736e52\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/icsrange.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10736e50\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/02\/ICSRange_logo_348x77px.png\" width=\"300\" height=\"\" alt=\"ICS Range is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About ICS Range<\/strong><br \/>\nICS Range: Learn better, faster and more efficient OT Security.<br \/>\nThe ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems \u2013 ranging from basic introduction level to expert level education.<br \/>\nTo limit the shortages of qualified OT security employees, access to the range is very simple: \u2013 just open a browser, enter credentials and access to the environment is ready within seconds.<br \/>\nThe range is full of real-life industrial OT\/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/icsrange.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">icsrange.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754566830{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10737174 { opacity: 1; }#ut_am_wrap_69e7b10737175 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10737175 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10737175 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10737175 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10737175 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10737175\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10737176\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.egede.co\/en\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10737174\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 275 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/03\/Egede_logo-red-black_300x105px.png\" width=\"275\" height=\"\" alt=\"Egede is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Egede ApS<\/strong><br \/>\nEgede ApS was founded by S\u00f8ren Egede Knudsen, who has over 25 years of experience in cybersecurity and networking. S\u00f8ren has been dedicated to working with cybersecurity in the industrial sector since 2009.<\/p>\n<p>Egede ApS focuses on cybersecurity within industrial systems and networks, also known as SCADA, OT (Operational Technology), or ICS (Industry Control Systems). These systems are used in many manufacturing companies and especially in critical infrastructure.<\/p>\n<p>Areas within the industrial sector that are part of the regular work scope at Egede ApS include industrial penetration testing and analysis, cybersecurity design and consulting, and hardware analysis and evaluations\u2014all within cybersecurity for the industrial sector for both management and technicians.<\/p>\n<p><strong>For more information about Egede ApS, contact S\u00f8ren Egede Knudsen at <a href=\"https:\/\/www.egede.co\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.egede.co<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754566830{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10737491 { opacity: 1; }#ut_am_wrap_69e7b10737492 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10737492 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10737492 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10737492 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10737492 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10737492\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10737493\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/itb.dk\/\" ><div class=\"ut-animated-image-zoom\"><img loading=\"lazy\" decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10737491\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 81'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/it-branchen_300x81px.png\" width=\"300\" height=\"81\" alt=\"IT-Branchen is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Om IT-Branchen<\/strong><br \/>\nIT-Branchen hj\u00e6lper hver dag vores medlemmer, branchen og samfundet med at vokse.<br \/>\nVi br\u00e6nder for at skabe et digitalt samfund for alle. Et samfund i v\u00e6kst, og hvor Danmark st\u00e5r som et globalt fyrt\u00e5rn, fordi vi udnytter teknologien til gavn for klimaet, \u00f8konomien og det enkelte menneske.<br \/>\nVi lader ildsj\u00e6lene hos vores medlemmer s\u00e6tte retningen for en bedre fremtid. Det gavner Danmark, erhvervslivet, den enkelte borger og vores medlemsvirksomheder.<\/p>\n<p><strong>For mere information: <a href=\"https:\/\/itb.dk\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.itb.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1697619627971{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107377f8 { opacity: 1; }#ut_am_wrap_69e7b107377f9 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107377f9 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107377f9 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107377f9 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107377f9 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107377f9\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107377fa\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/engage.isaca.org\/austriachapter\/home\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107377f8\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 260 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/ISACA-Austria-Chapter_25-yr-anniv_310x112px.png\" width=\"260\" height=\"\" alt=\"ISACA Austria Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10737b57 { opacity: 1; }#ut_am_wrap_69e7b10737b58 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10737b58 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10737b58 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10737b58 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10737b58 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10737b58\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10737b59\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.isacabcn.org\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10737b57\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/ISACA_logo_Barcelona_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Barcelona Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10737eaa { opacity: 1; }#ut_am_wrap_69e7b10737eab .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10737eab .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10737eab { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10737eab { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10737eab { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10737eab\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10737eac\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/isaca.be\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10737eaa\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/ISACA_logo_Belgium_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Belgium Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1697619627971{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107381de { opacity: 1; }#ut_am_wrap_69e7b107381df .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107381df .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107381df { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107381df { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107381df { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107381df\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107381e0\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.isaca.de\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107381de\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/ISACA_logo_Germany_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Germany Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107386b0 { opacity: 1; }#ut_am_wrap_69e7b107386b1 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107386b1 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107386b1 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107386b1 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107386b1 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107386b1\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107386b2\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/engage.isaca.org\/lithuaniachapter\/home\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107386b0\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/08\/ISACA_logo_Lithuania_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Lithuania Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107389f8 { opacity: 1; }#ut_am_wrap_69e7b107389f9 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107389f9 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107389f9 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107389f9 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107389f9 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107389f9\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107389fa\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.isaca.no\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107389f8\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/ISACA_logo_Norway_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Norway Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1697619627971{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10738d05 { opacity: 1; }#ut_am_wrap_69e7b10738d06 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10738d06 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10738d06 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10738d06 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10738d06 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10738d06\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10738d07\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/engage.isaca.org\/riyadh\/home\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10738d05\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/08\/ISACA_logo_Riyadh_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Riyadh Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073900f { opacity: 1; }#ut_am_wrap_69e7b10739010 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10739010 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10739010 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10739010 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10739010 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10739010\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10739011\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.isaca.or.tz\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073900f\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/10\/ISACA_Tanzania_logo_hvid-baggrund_300x104px.png\" width=\"250\" height=\"\" alt=\"ISACA Tanzania Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10739305 { opacity: 1; }#ut_am_wrap_69e7b10739306 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10739306 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10739306 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10739306 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10739306 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10739306\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10739307\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/women4cyber.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10739305\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/11\/Women4CyberDK_250x137px.png\" width=\"200\" height=\"\" alt=\"Women4Cyber Denmark Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1697619627971{margin-top: 0px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10739641 { opacity: 1; }#ut_am_wrap_69e7b10739642 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10739642 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10739642 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10739642 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10739642 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10739642\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10739643\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/women4cyber-slovenia\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10739641\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/11\/Women4CyberSLO_250x133px.png\" width=\"200\" height=\"\" alt=\"Women4Cyber Slovenia Chapter is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10739949 { opacity: 1; }#ut_am_wrap_69e7b1073994a .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073994a .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073994a { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073994a { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073994a { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073994a\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073994b\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.sikkerhedsfokus.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10739949\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/10\/SikkerhedsFOKUS_dk.png\" width=\"300\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][vc_column][ut_title_divider_2 divider=&#8221;bklyn-divider-style-5&#8243; align=&#8221;center&#8221; color=&#8221;#5483ac&#8221;]PARTNERS 2025[\/ut_title_divider_2][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10739c3c { opacity: 1; }#ut_am_wrap_69e7b10739c3d .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10739c3d .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10739c3d { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10739c3d { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10739c3d { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10739c3d\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10739c3e\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/advenica.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10739c3c\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2026\/03\/2026LOGO-Advenica_logo_blue_HEX_screen_250227_400x71px.png\" width=\"300\" height=\"\" alt=\"Advenica is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Advenica<\/strong><br \/>\nAdvenica\u2019s expertise helps countries, authorities, companies and organisations protect the most important digital information. Our well-proven and trusted cybersecurity solutions isolate networks physically while connecting data securely. Since the start in 1993, we design, develop and manufacture all crypto and segmentation products in Sweden to ensure high assurance.<br \/>\nRead about our unique technology and its EU and national approvals at the highest security level at <strong><a href=\"https:\/\/advenica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.advenica.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1690219240581{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10739f4b { opacity: 1; }#ut_am_wrap_69e7b10739f4c .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10739f4c .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10739f4c { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10739f4c { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10739f4c { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10739f4c\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10739f4d\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.armis.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10739f4b\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 185 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/07\/armis_logo_200x81px.png\" width=\"185\" height=\"\" alt=\"Armis is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Armis<\/strong><br \/>\nArmis\u00ae is the leading unified asset visibility &amp; security platform designed to address the new threat landscape created by connected devices. Fortune 1000 companies trust our real-time, continuous, and agentless protection to see all managed, unmanaged, and IoT devices with full context, including medical devices (IoMT), operational technology (OT) and industrial control systems (ICS).<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.armis.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.armis.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073a258 { opacity: 1; }#ut_am_wrap_69e7b1073a259 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073a259 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073a259 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073a259 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073a259 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073a259\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073a25a\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.boozallen.com\/markets\/commercial-solutions.html?origref=&#038;vURL=\/commercial\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073a258\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 125 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/09\/BoozAllen_logo_200x132px.png\" width=\"125\" height=\"\" alt=\"Booz Allen is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Booz Allen<\/strong><br \/>\nBooz Allen is the advanced technology company delivering outcomes with speed for America&#8217;s most critical defense, civil, and national security priorities. We build technology solutions using AI, cyber, and other cutting-edge technologies to advance and protect the nation and its citizens. By focusing on outcomes, we enable our people, clients, and their missions to succeed, accelerating the nation to realize our purpose: Empower People to Change the World\u00ae.<\/p>\n<p><strong><a href=\"https:\/\/www.boozallen.com\/markets\/commercial-solutions.html?origref=&amp;vURL=\/commercial\" target=\"_blank\" rel=\"noopener\">Cybersecurity Services for Business and Industry<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073a703 { opacity: 1; }#ut_am_wrap_69e7b1073a704 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073a704 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073a704 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073a704 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073a704 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073a704\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073a705\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"http:\/\/claroty.com\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073a703\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 275 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/07\/Claroty-Logo-2022-FullColor.png\" width=\"275\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Claroty<br \/>\n<\/strong>Claroty has redefined CPS protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. Claroty provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threat detection \u2013 whether in the cloud or on-premise. Backed by award-winning threat research and a breadth of technology alliances, Claroty enables organizations to effectively reduce CPS risk, with the fastest time-to-value and lower total cost of ownership. Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.<\/p>\n<p><strong>To learn more, visit <a href=\"http:\/\/claroty.com\">claroty.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073aa40 { opacity: 1; }#ut_am_wrap_69e7b1073aa41 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073aa41 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073aa41 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073aa41 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073aa41 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073aa41\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073aa42\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.comm2ig.dk\/chrome-os\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073aa40\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 275 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/06\/Comm2ig_logo__320x55px.png\" width=\"275\" height=\"\" alt=\"Comm2ig is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Comm2ig<\/strong><br \/>\nComm2ig is a full-service IT reseller, assisting with everything from the delivery and implementation of clients, licenses, AV, and security solutions, to comprehensive data center and cloud solutions. We deliver IT solutions to businesses of all sizes and are a supplier on a number of public framework agreements.<\/p>\n<p>At Industrial Security Conference Copenhagen, Comm2ig is represented by our ChromeOS team. ChromeOS is a cloud-first operating system with built-in, proactive security. In fact, there have never been any reported ransomware attacks on devices running ChromeOS.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.comm2ig.dk\/chrome-os\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.comm2ig.dk\/chrome-os<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073ad4b { opacity: 1; }#ut_am_wrap_69e7b1073ad4c .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073ad4c .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073ad4c { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073ad4c { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073ad4c { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073ad4c\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073ad4d\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/cyolo.io\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073ad4b\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 215 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/05\/cyolo_logo_350x103px.png\" width=\"215\" height=\"\" alt=\"Cyolo is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Cyolo<\/strong><br \/>\nCyolo is a leading cybersecurity innovator dedicated to providing cutting-edge access solutions for all environments and deployment scenarios. With a focus on security, operational agility, and user experience, Cyolo is fostering a transition from merely enabling access to empowering operations, productivity, and compliance with its Cyolo PRO (Privileged Remote Operations) solution.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/cyolo.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyolo.io<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073b054 { opacity: 1; }#ut_am_wrap_69e7b1073b055 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073b055 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073b055 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073b055 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073b055 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073b055\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073b056\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/dediko.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073b054\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/05\/Dediko_logo_211x151px.png\" width=\"200\" height=\"\" alt=\"Dediko is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Dediko<\/strong><br \/>\nDediko is a Danish cybersecurity company specializing in implementing SANS Top5 and CIS 18 controls in OT\/ICS environments. With a focus on operational reliability and compliance, Dediko helps organizations strengthen their security infrastructure through targeted analyses, maturity assessments, and automated solutions. Dediko also provides advisory services to boards and executives, as well as tools to effectively manage cyber risks in critical infrastructure.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/dediko.dk\/\" target=\"_blank\" rel=\"noopener noreferrer\">dediko.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073b338 { opacity: 1; }#ut_am_wrap_69e7b1073b339 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073b339 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073b339 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073b339 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073b339 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073b339\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073b33a\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.dnv.com\/cyber\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073b338\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 185 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/05\/DNV_Cyber_logo_258x156px.png\" width=\"185\" height=\"\" alt=\"DNV Cyber is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About DNV Cyber<\/strong><br \/>\nDNV Cyber is a leading cybersecurity services provider that empowers businesses with complex needs to become safer and more resilient. A global team of more than 500 experts brings over 30 years of IT and industrial control system security experience to help customers in multiple industry sectors breathe easier and perform better.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.dnv.com\/cyber\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.dnv.com\/cyber<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073b63a { opacity: 1; }#ut_am_wrap_69e7b1073b63b .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073b63b .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073b63b { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073b63b { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073b63b { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073b63b\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073b63c\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.forescout.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073b63a\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 185 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/06\/forescout_stacked-blueblack_200x115px.png\" width=\"185\" height=\"\" alt=\"Forescout is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Forescout<\/strong><br \/>\nForescout delivers automated cybersecurity across the digital enterprise, maintaining continuous alignment of customers\u2019 security frameworks with their digital realities, including all asset types \u2013 IT, IoT, OT, IoMT. The Forescout Platform provides leading asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.forescout.com\/\" target=\"_blank\" rel=\"noopener\">www.forescout.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073b92e { opacity: 1; }#ut_am_wrap_69e7b1073b92f .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073b92f .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073b92f { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073b92f { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073b92f { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073b92f\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073b930\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.fortinet.com\/solutions\/industries\/scada-industrial-control-systems\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073b92e\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/05\/fortinet_logo_BlackRed_332x38px.png\" width=\"250\" height=\"\" alt=\"Fortinet is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Fortinet<\/strong><br \/>\nFortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world\u2019s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet\u2019s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.<\/p>\n<p><strong>Learn more at <a href=\"https:\/\/www.fortinet.com\/?utm_source=pr&amp;utm_campaign=fortinet\" target=\"_blank\" rel=\"noopener\">www.fortinet.com<\/a>, the <a href=\"https:\/\/www.fortinet.com\/blog?utm_source=pr&amp;utm_campaign=blog\" target=\"_blank\" rel=\"noopener\">Fortinet Blog<\/a>, or <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=pr&amp;utm_campaign=FortiGuardLabs\" target=\"_blank\" rel=\"noopener\">FortiGuard Labs<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073bc2d { opacity: 1; }#ut_am_wrap_69e7b1073bc2e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073bc2e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073bc2e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073bc2e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073bc2e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073bc2e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073bc2f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.gigamon.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073bc2d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/08\/Print-2015-Gigamon-Text-Orange-Horizontal-Logo.jpg\" width=\"225\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Gigamon<\/strong><br \/>\nGigamon\u00ae offers a deep observability pipeline that efficiently delivers network-derived telemetry to your cloud, security, and observability tools, helping organizations eliminate security blind spots, reduce tool costs, and better secure and manage your hybrid cloud infrastructure. Gigamon goes beyond security and observability log-based approaches by extracting real-time network intelligence derived from packets, flows, and application metadata to deliver defence-in-depth and complete performance management. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.<\/p>\n<p><strong>To learn more, please visit <a href=\"https:\/\/www.gigamon.com\/\" target=\"_blank\" rel=\"noopener\">gigamon.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754254269{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073bd2d { opacity: 1; }#ut_am_wrap_69e7b1073bd2e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073bd2e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073bd2e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073bd2e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073bd2e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073bd2e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073bd2f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/icsrange.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073bd2d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/02\/ICSRange_logo_348x77px.png\" width=\"225\" height=\"\" alt=\"ICS Range is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About ICS Range<\/strong><br \/>\nICS Range: Learn better, faster and more efficient OT Security.<br \/>\nThe ICS Range is an educational platform, build to further train and educate all employees who work daily with Operational technology (OT) systems \u2013 ranging from basic introduction level to expert level education.<br \/>\nTo limit the shortages of qualified OT security employees, access to the range is very simple: \u2013 just open a browser, enter credentials and access to the environment is ready within seconds.<br \/>\nThe range is full of real-life industrial OT\/ICS equipment, full of opportunities to learn hand-on while real life vulnerabilities could be exploited by you.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/icsrange.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">icsrange.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073c01b { opacity: 1; }#ut_am_wrap_69e7b1073c01c .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073c01c .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073c01c { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073c01c { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073c01c { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073c01c\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073c01d\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/thetechcollective.eu\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073c01b\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 210 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/08\/implement_250x67px.png\" width=\"210\" height=\"\" alt=\"Implement is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Implement<\/strong><br \/>\nWhen we founded Implement, our dream was to help people and organisations succeed with their most important change initiatives. It was a simple dream of moving something forward, to improve and create impact. To turn ambitions into reality. This will probably never change.<br \/>\nToday, after more than 20 years, we still aspire to be catalysts of real change and transformation, with an ambition of leaving every organisation that we touch, at a truly better place \u2013 more fit for humans and more fit for the future. Empowering every human and organisation to achieve more.<br \/>\nThis foundation and ambition has implications. It\u2019s not enough to point to a solution, to deliver a strategy and a plan for how to get there. In any encounter, we try to engage in a way that leverages the wisdom of the crowd and makes the organisation own the change for real. Interacting in a way that engages the hearts and minds, that makes the change-makers shine and grow in the process, so that we co-create sustainable impact fast.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/implementconsultinggroup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.implementconsultinggroup.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753148429{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073c37d { opacity: 1; }#ut_am_wrap_69e7b1073c37e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073c37e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073c37e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073c37e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073c37e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073c37e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073c37f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.mnemonic.io\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073c37d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/mnemonic_300x91px..png\" width=\"225\" height=\"\" alt=\"mnemonic is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About mnemonic<\/strong><br \/>\nmnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.<br \/>\nOur expert team of security consultants, product specialists, threat researchers, incident responders and ethical hackers, combined with our Argus security platform ensures we stay ahead of advanced cyberattacks and protect our customers from evolving threats.<br \/>\nAcknowledged by Gartner as a notable vendor in delivering Managed Detection and Response (MDR) services, threat intelligence and advanced targeted attack detection, we are among the largest IT security service providers in Europe, the preferred security partner of the region\u2019s top companies and a trusted source of threat intelligence to Europol and other law enforcement agencies globally.<br \/>\nWith intelligence-driven managed security services, 250+ security experts and partnerships with leading security vendors, mnemonic enables businesses to stay secure and compliant while reducing costs.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.mnemonic.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.mnemonic.io<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753148429{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073c6b3 { opacity: 1; }#ut_am_wrap_69e7b1073c6b4 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073c6b4 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073c6b4 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073c6b4 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073c6b4 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073c6b4\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073c6b5\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.mnemonic.io\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073c6b3\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/Nozomi-Networks_275x76.png\" width=\"225\" height=\"\" alt=\"Nozomi Networks is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Nozomi Networks<br \/>\n<\/strong>Nozomi Networks protects the world\u2019s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.<\/p>\n<p><strong>For more information: <a href=\"http:\/\/www.nozominetworks.com\" target=\"_blank\" rel=\"noopener\">www.nozominetworks.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073c9fa { opacity: 1; }#ut_am_wrap_69e7b1073c9fb .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073c9fb .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073c9fb { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073c9fb { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073c9fb { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073c9fb\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073c9fc\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.se.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073c9fa\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/08\/schneider-electric_logo_250x74px.png\" width=\"200\" height=\"\" alt=\"Schneider Electric is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Schneider Electric<br \/>\n<\/strong>Schneider\u2019s\u00a0<strong>purpose is to create Impact<\/strong>\u00a0by empowering all to\u00a0<strong>make the most of our energy and resources<\/strong>, bridging progress and sustainability for all. At Schneider, we call this\u00a0<strong>Life Is On<\/strong>.<\/p>\n<p>Our mission is to be the trusted partner in\u00a0<strong>Sustainability and Efficiency<\/strong>.<\/p>\n<p>We are a\u00a0<strong><em>global industrial technology leader<\/em><\/strong>\u00a0bringing world-leading expertise in electrification, automation and digitization to smart\u00a0<strong>industries<\/strong>, resilient\u00a0<strong>infrastructure<\/strong>, future-proof\u00a0<strong>data centers<\/strong>, intelligent\u00a0<strong>buildings<\/strong>, and intuitive\u00a0<strong>homes<\/strong>. Anchored by our deep domain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation, software and services, delivering digital twins to enable profitable growth\u00a0<strong>for our customers<\/strong>.<\/p>\n<p>We are a\u00a0<strong>people company<\/strong>\u00a0with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries to ensure proximity to our customers and stakeholders. We embrace\u00a0<strong>diversity and inclusion<\/strong>\u00a0in everything we do, guided by our meaningful purpose of a\u00a0<strong>sustainable future for all<\/strong>.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.se.com\/dk\/da\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.se.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073cd65 { opacity: 1; }#ut_am_wrap_69e7b1073cd66 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073cd66 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073cd66 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073cd66 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073cd66 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073cd66\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073cd67\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/communications.sectra.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073cd65\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 185 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/08\/Sectra_logo-grey_250x47px.png\" width=\"185\" height=\"\" alt=\"Sectra is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Sectra<\/strong><br \/>\nSectra is a leading expert in cybersecurity with over a decade of experience in OT-security. Dedicated to supporting critical societal functions, the company provides security monitoring and risk analysis for systems vital to essential services such as electricity and water distribution. The company also develops highly secure communication systems with advanced encryption. Founded in 1978, Sectra is headquartered in Link\u00f6ping, Sweden.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/communications.sectra.com\/\">sectra.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073d0e3 { opacity: 1; }#ut_am_wrap_69e7b1073d0e4 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073d0e4 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073d0e4 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073d0e4 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073d0e4 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073d0e4\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073d0e5\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"http:\/\/www.secudea.be\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073d0e3\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/07\/SECUDEAlogobig.png\" width=\"250\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Secudea<br \/>\n<\/strong><strong>Consultancy:\u00a0<\/strong>Do you need help with cybersecurity within industrial environments? Do you require assistance in setting security requirements and guidelines for green fields? We provide independent, business driven industrial security consultancy services.<br \/>\n<strong>Assessments:\u00a0<\/strong>Want to have your industrial environment tested, validated or assessed? Do you want to know what risks there are in your current environment? Need to perform risk or maturity assessments? We can help you identifying your risks through our assessment services.<br \/>\n<strong>Training:\u00a0<\/strong>Whether you would like to learn something new like how to perform hardening of systems within industrial environments or if you want to organize an awareness day on OT security in your organization, we can provide you real experience based training and coaching.<\/p>\n<p><strong>For more information: <a href=\"http:\/\/www.secudea.be\">www.secudea.be<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073d492 { opacity: 1; }#ut_am_wrap_69e7b1073d493 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073d493 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073d493 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073d493 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073d493 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073d493\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073d494\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/securenok.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073d492\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/06\/Secure-NOK_logo_300x56px.png\" width=\"250\" height=\"\" alt=\"Secure-NOK is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Secure-NOK<\/strong><br \/>\nSecure-NOK is a trusted leader within cybersecurity for OT. We develop the SNOK platform, a European developed monitoring solution for owners of industrial production facilities and critical infrastructure.<\/p>\n<p>The SNOK platform offers a unique combination of network, endpoint and PLC sensors to detect early signs of cyber-attacks in OT. Our European based Security Center provides professional services, including intelligence-driven analytics to allow effective responses to cyber threats.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/securenok.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">securenok.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073d88e { opacity: 1; }#ut_am_wrap_69e7b1073d88f .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073d88f .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073d88f { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073d88f { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073d88f { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073d88f\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073d890\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/securiot.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073d88e\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/securiot_250x60px.png\" width=\"250\" height=\"\" alt=\"SecuriOT is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About SecuriOT<br \/>\n<\/strong>SecuriOT is specialized in cyber security for OT\/ICS environments. As a company recognized for its high level of dedication to and expertise in the OT\/ICS niche, SecuriOT is the &#8220;trusted advisor&#8221; and preferred partner for OT cyber security of organizations running <em>critical infrastructure and critical control systems<\/em>.<\/p>\n<p>SecuriOT delivers a variety of recognized industry leading <em>solutions, consultancy and services<\/em> to help secure production systems (OT\/ICS) against cyber threats. In addition to that SecuriOT has developed internationally recognized <em>software tools<\/em> supporting OT security teams in their <em>risk assessment and management<\/em> work.<\/p>\n<p>An important foundation for SecuriOTs business approach is that OT-security is not just fixed with a quick analysis or a network component. It is a continuous process to ensure security at the right level, and it often requires a new mindset, greater visibility and a better understanding of the cyber threats against your company. This is where SecuriOT creates value for our customers. SecuriOT is a part of <a href=\"http:\/\/www.novotek.com\" target=\"_blank\" rel=\"noopener\">NOVOTEK Group<\/a>.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/securiot.dk\/\">www.securiOT.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073dc65 { opacity: 1; }#ut_am_wrap_69e7b1073dc66 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073dc66 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073dc66 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073dc66 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073dc66 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073dc66\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073dc67\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/sensorfu.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073dc65\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 235 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/SensorFu_logo-cyan_400x63px.png\" width=\"235\" height=\"\" alt=\"SensorFu is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About SensorFu<\/strong><br \/>\n<strong>SensorFu<\/strong> provides automated verification of network isolation. Its <strong>Beacon<\/strong> technology continuously tests segmentation by sending controlled, non-intrusive signals across network boundaries to confirm that isolation rules are enforced. This proactive approach ensures that critical separations remain intact, reducing manual audits and improving security assurance in business-critical environments.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/sensorfu.com\/\">SensorFu.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073e022 { opacity: 1; }#ut_am_wrap_69e7b1073e023 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073e023 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073e023 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073e023 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073e023 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073e023\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073e024\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"http:\/\/www.siemens.com\/cybersecurity\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073e022\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/Siemens_283x45px.png\" width=\"200\" height=\"\" alt=\"Siemens is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Cybersecurity at Siemens<\/strong><br \/>\nProtect what you value \u2013 with a holistic approach and leading technology expertise.<br \/>\nWith us you get a focus on the important entities affected by NIS 2 Directive, and we are continuously working on reinforcing the comprehensive protection among products, solutions, and services.<\/p>\n<p><strong>Building <\/strong><br \/>\nImprove your building network security \u2013 with the latest developments in building protocols, through IT best practices and easy integration with existing IT infrastructure.<\/p>\n<p>We ensure that our information security management systems (ISMS) adhere to the highest international standards. This includes ISO\/IEC 27001 certification for our common Remote Service Platform (cRSP) and cloud-based data management platform, Navigator.<\/p>\n<p><strong>Grid<\/strong><br \/>\nSecurity by design for your grid \u2013 to cope with the increasing demands in a scalable manner based on international standards.<\/p>\n<p>Secure systems are vital for critical infrastructure. We offer well designed products, systems, and solutions to ensure the security of the energy infrastructure including stringent security requirements of the BDEW, IEC 62443, IEC 62351, and NERC CIP.<\/p>\n<p><strong>Industry<\/strong><br \/>\nProven concept securing your industry \u2013 from the operational to the field level and from the protection of data to secure communication.<\/p>\n<p>With &#8220;Defense in Depth&#8221;, Siemens provides a multilayer security concept that gives plant operators, integrators, and component manufacturers all-round and in-depth protection as recommended by the international standard IEC 62443.<\/p>\n<p>We draw on experience from our own production plants and incorporate the latest knowledge about cyber treats into our products and services and when necessary, Security Advisories also inform you of current threats to your company and any necessary updates to our products.<\/p>\n<p><strong>For more information: <a href=\"http:\/\/www.siemens.com\/cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">www.siemens.com\/cybersecurity<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073e3d1 { opacity: 1; }#ut_am_wrap_69e7b1073e3d2 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073e3d2 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073e3d2 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073e3d2 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073e3d2 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073e3d2\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073e3d3\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.truesec.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073e3d1\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/06\/Truesec-Logo-Medium-Black_350x38.png\" width=\"200\" height=\"\" alt=\"Truesec is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Truesec<\/strong><br \/>\nTruesec is an international cybersecurity company that offers market-leading managed services, incident management, and expert consulting services. Truesec operates the largest Security Operations Center (SOC) in the Nordics and has conducted over 100,000 hours of incident management. The company\u2019s goal is to prevent breaches and minimize impact. Since 2005, Truesec has delivered advanced security solutions to clients in both the private and public sectors worldwide, including critical infrastructure and operational technology environments that require specialized protection. Today, the company comprises 350+ cyber specialists with deep expertise and a leading role in cybersecurity in the Nordics.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.truesec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Truesec.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753200708{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073e753 { opacity: 1; }#ut_am_wrap_69e7b1073e754 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073e754 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073e754 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073e754 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073e754 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073e754\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073e755\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.txone.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073e753\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/TXOne_229x55px.png\" width=\"200\" height=\"\" alt=\"TXOne is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About TXOne Networks<\/strong><br \/>\nTXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. At TXOne Networks, we work together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time defense-in-depth manner.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.txone.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.txone.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073eb0d { opacity: 1; }#ut_am_wrap_69e7b1073eb0e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073eb0e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073eb0e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073eb0e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073eb0e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073eb0e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073eb0f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/waterfall-security.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073eb0d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/09\/waterfall_new-logo-2023.png\" width=\"250\" height=\"\" alt=\"Waterfall Security Solutions is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Waterfall Security Solutions<\/strong><br \/>\nWaterfall Security Solutions Ltd. Privately-owned since 2007, Waterfall Security has focused on protecting critical infrastructure and industrial control systems from online cyberattacks, becoming the leading cybersecurity vendor for industrial control systems (ICS) perimeter security. Waterfall Security\u2019s technology enables safe and reliable IT\/OT integration, remote monitoring and diagnostics, and advanced cloud services. Over the course of the last 30 years, connecting industrial control systems to the Internet and IT networks has become an essential part of business operations. This added connectivity provides many advantages to industrial engineers and to businesses overall, enabling real-time visibility into production systems and information. The emerging wave of the Industrial Internet of Things (IIoT) has taken hold, promising unparalleled growth and performance gains to industrial systems. However, the additional interconnectivity of numerous sensors and devices, greatly increases the potential attack surface for cyber crime, and the vulnerability of every connected industrial site. In addition, there has been a rapid growth both in the \u2018class\u2019 of attackers, as well as in their motivations to do harm. Modern attacks aim to disrupt production, cause downtime, demand ransomware, damage equipment, trigger environmental incidents, harm a company\u2019s brand or target human lives.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/waterfall-security.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">waterfall-security.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073ee8b { opacity: 1; }#ut_am_wrap_69e7b1073ee8c .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073ee8c .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073ee8c { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073ee8c { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073ee8c { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073ee8c\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073ee8d\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/xage.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073ee8b\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/09\/Xage-Security_logo_250x92px.png\" width=\"200\" height=\"\" alt=\"Xage Security is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Xage Security<\/strong><br \/>\nXage Security delivers Unified Zero Trust for Critical Systems to help protect organizations around the globe. The Xage Fabric enables secure remote access, privileged access management, and critical asset protection across IT, OT, cloud with identity-based controls that includes multi-layered access management and segmentation. Xage protects OT and IT systems without requiring network changes, helps to meet compliance requirements, and replaces VPNs, jump servers, and traditional PAM solutions.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/xage.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">xage.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073f221 { opacity: 1; }#ut_am_wrap_69e7b1073f222 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073f222 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073f222 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073f222 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073f222 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073f222\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073f223\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.xonasystems.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073f221\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 175 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/05\/xona_logo-2024_250x57px.png\" width=\"175\" height=\"\" alt=\"XONA is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About XONA<\/strong><br \/>\nXONA enables frictionless user access that\u2019s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA\u2019s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.<\/p>\n<p>With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.xonasystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.xonasystems.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section][vc_row][vc_column]<style type=\"text\/css\">#bklyn_btn_69e7b1073f2e9 .bklyn-btn { color:#30135e !important; border-radius:7px !important; background-color:#f9922d !important; }#bklyn_btn_69e7b1073f2e9 .bklyn-btn:hover{ color:#f9922d !important; background-color:#30135e !important; }#bklyn_btn_69e7b1073f2e9 .bklyn-btn:focus{ color:#f9922d !important; background-color:#30135e !important; }#bklyn_btn_69e7b1073f2e9 .bklyn-btn:active { color:#f9922d !important; background-color:#30135e !important; }#bklyn_btn_69e7b1073f2e9 a { letter-spacing:0.05em; }<\/style><div id=\"bklyn_btn_69e7b1073f2e9\" class=\"bklyn-btn-holder  bklyn-btn-center\"><a title=\"\"   href=\"https:\/\/insightevents.dk\/isc-cph\/partner-information\/\" target=\"_blank\" class=\"bklyn-btn  bklyn-btn-large\" ><span class=\"ut-btn-text\">Join as a partner<\/span><\/a><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section disable_element=&#8221;yes&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1073f6a1 { opacity: 1; }#ut_am_wrap_69e7b1073f6a2 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1073f6a2 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1073f6a2 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1073f6a2 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1073f6a2 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1073f6a2\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1073f6a3\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/2cnetworks.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1073f6a1\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/05\/2C-networks_logo_350x64px.png\" width=\"250\" height=\"\" alt=\"2C Networks is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Om 2C Networks<\/strong><br \/>\n2C Networks br\u00e6nder vi for at skabe klarhed og tryghed i en kompleks verden.<br \/>\nHos os f\u00e5r du overblik over din IT- og OT- infrastruktur og kontrol med dine cybersikkerheds-l\u00f8sninger.<\/p>\n<p>Vores 4 kompetenceomr\u00e5der:<\/p>\n<ul>\n<li><strong>Advisory Services<\/strong><br \/>\nIT- og OT-strategi, Crisis Management m.m.<\/li>\n<li><strong>Managed Services<\/strong><br \/>\nDa det er sv\u00e6rt og tidskr\u00e6vende at drive Cybersecurity &amp; Netv\u00e6rk med h\u00f8j kvalitet.<\/li>\n<li><strong>Consultancy<\/strong><br \/>\nAlle Network &amp; Security producenter supporteres<\/li>\n<li><strong>Solution Sales<\/strong><br \/>\nFortinet, Nozomi Networks, Arista &amp; Holm Security<\/li>\n<\/ul>\n<p><strong>For mere information: <a href=\"https:\/\/2cnetworks.dk\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.2cnetworks.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107406d2 { opacity: 1; }#ut_am_wrap_69e7b107406d3 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107406d3 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107406d3 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107406d3 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107406d3 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107406d3\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107406d4\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/advenica.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107406d2\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 110 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/09\/advenica_125x170px.png\" width=\"110\" height=\"\" alt=\"Advenica is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Advenica<\/strong><br \/>\nAdvenica\u2019s expertise helps countries, authorities, companies and organisations protect the most important digital information. Our well-proven and trusted cybersecurity solutions isolate networks physically while connecting data securely. Since the start in 1993, we design, develop and manufacture all crypto and segmentation products in Sweden to ensure high assurance.<br \/>\nRead about our unique technology and its EU and national approvals at the highest security level at <strong><a href=\"https:\/\/advenica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.advenica.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10740e64 { opacity: 1; }#ut_am_wrap_69e7b10740e65 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10740e65 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10740e65 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10740e65 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10740e65 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10740e65\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10740e66\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/arbitcds.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10740e64\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 125 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/09\/arbit_logo_200x82px.png\" width=\"125\" height=\"\" alt=\"Arbit Cyber Defence Systems is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Arbit Cyber Defence Systems<\/strong><br \/>\nArbit Cyber Defence Systems specializes in secure cross-domain solutions for high-security data transfers across government, intelligence, and defense. Trusted by security organizations across Europe, Arbit ensures strong protection by integrating with OPSWAT. This partnership helps securing critical infrastructure against evolving cyber threats, ensuring seamless and secure operations.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/arbitcds.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Arbit Cyber Defence Systems<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1636482906227{margin-bottom: -50px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1074140d { opacity: 1; }#ut_am_wrap_69e7b1074140f .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1074140f .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1074140f { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1074140f { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1074140f { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1074140f\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10741410\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.avanade.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1074140d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300px 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/10\/Avanade_logo_800x600px.jpg\" width=\"300px\" height=\"\" alt=\"Avanade\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Avanade<\/strong><br \/>\nAvanade is the leading provider of security and cloud services, business solutions and design-led experiences on the Microsoft ecosystem. With 50,000 employees, we are the world&#8217;s largest Microsoft partner.<\/p>\n<p>At Avanade, we\u2019re the experts at helping you secure your hybrid IT and OT ecosystems. We combine leading Microsoft OT security technology with experienced consulting and the world leading managed SOC service \u2013 creating a state-of-the-art solution for detection and response on Industrial network.<\/p>\n<p>We provide end-to-end detection and defense against sophisticated attacks utilizing Microsoft Azure Defender for OT and advanced behavioral security monitoring and SOC capabilities through Azure Sentinel. And we offer effortless monitoring across OT, on premise and cloud which increase visibility for threat actors moving across environments and reduce cost for running multiple SOC.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender-for-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">azure.microsoft.com\/en-us\/services\/azure-defender-for-iot\/<\/a> and <a href=\"https:\/\/www.avanade.com\/en\/solutions\/security-service-solutions\" target=\"_blank\" rel=\"noopener noreferrer\">www.avanade.com\/en\/solutions\/security-service-solutions<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10741b2c { opacity: 1; }#ut_am_wrap_69e7b10741b2d .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10741b2d .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10741b2d { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10741b2d { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10741b2d { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10741b2d\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10741b2e\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.beyondtrust.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10741b2c\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 275 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/06\/BeyondTrust_logo_300x81px.png\" width=\"275\" height=\"\" alt=\"BeyondTrust is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About BeyondTrust<\/strong><br \/>\nBeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry&#8217;s most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.<\/p>\n<p>With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network.<\/p>\n<p><strong>Learn more at <a href=\"https:\/\/www.beyondtrust.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.beyondtrust.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10742225 { opacity: 1; }#ut_am_wrap_69e7b10742226 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10742226 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10742226 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10742226 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10742226 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10742226\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10742227\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.cisco.com\/c\/da_dk\/index.html\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10742225\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 165 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/10\/cisco_logo_250x132px.png\" width=\"165\" height=\"\" alt=\"Cisco is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Cisco<\/strong><br \/>\nCisco (NASDAQ: CSCO) is a global leader in networking technology, driving innovation in the areas of networking, cybersecurity, collaboration, and cloud solutions. With a commitment to shaping the future of the internet, Cisco empowers organizations to securely connect and thrive in a digital world. Through its comprehensive portfolio of products and services, Cisco enables seamless communication, enhances productivity, and fosters digital transformation for businesses of all sizes.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.cisco.com\/c\/da_dk\/index.html\" target=\"_blank\" rel=\"noopener\">Cisco.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1632918307122{margin-bottom: -50px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10742821 { opacity: 1; }#ut_am_wrap_69e7b10742822 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10742822 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10742822 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10742822 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10742822 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10742822\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10742823\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.claroty.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10742821\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/08\/Claroty_logo_800x600px.png\" width=\"300\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Claroty<\/strong><br \/>\nClaroty is the industrial cybersecurity company. Trusted by the world\u2019s largest enterprises, Claroty helps customers reveal, protect, and manage their OT, IoT, and IIoT assets. The company\u2019s comprehensive platform connects seamlessly with customers\u2019 existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access\u2014all with a significantly reduced total cost of ownership. Claroty is backed and adopted by leading industrial automation vendors, with an expansive partner ecosystem and award-winning research team. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America, and deployments on all seven continents.<\/p>\n<p><strong>To learn more, visit <a href=\"https:\/\/www.claroty.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.claroty.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10742b88 { opacity: 1; }#ut_am_wrap_69e7b10742b8a .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10742b8a .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10742b8a { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10742b8a { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10742b8a { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10742b8a\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10742b8b\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/conscia.dk\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10742b88\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 180 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/08\/conscia_logo_200x83px.png\" width=\"180\" height=\"\" alt=\"Conscia is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Om Conscia<\/strong><br \/>\nConscia leverer it-infrastrukturl\u00f8sninger og 24\/7-services inden for netv\u00e6rk, datacenter, sikkerhed, mobility og cloud. Sammen med vores kunder arbejder vi m\u00e5lrettet for at f\u00e5 det st\u00f8rst mulige udbytte af de nyeste teknologier. Vi vil v\u00e6re de dygtigste inden for vores omr\u00e5der og kombinerer en dyb faglighed med den rette indstilling til, at projekterne lykkes, og at opgaver l\u00f8ses hurtigt og effektivt.<\/p>\n<p>Conscias viden og unikke serviceydelser sikrer vores kunder en konstant udvikling samt stabil drift. Vi er ambiti\u00f8se og s\u00e6tter niveauet h\u00f8jt, og vi arbejder aktivt for at skabe de bedste rammer for vores medarbejdere.<\/p>\n<p><strong>For mere information: <a href=\"https:\/\/conscia.dk\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.conscia.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10742f07 { opacity: 1; }#ut_am_wrap_69e7b10742f08 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10742f08 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10742f08 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10742f08 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10742f08 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10742f08\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10742f09\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/corelight.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10742f07\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 240 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/05\/corelight_horizontal-logo_250x57px.png\" width=\"240\" height=\"\" alt=\"Corelight is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Corelight<\/strong><br \/>\nCorelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight\u2019s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/corelight.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">corelight.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1074324a { opacity: 1; }#ut_am_wrap_69e7b1074324b .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1074324b .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1074324b { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1074324b { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1074324b { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1074324b\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074324c\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&#038;l=en&#038;o=3291940-1&#038;h=4192818674&#038;u=http%3A%2F%2Fwww.garlandtechnology.com%2F&#038;a=GarlandTechnology.com\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1074324a\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/GarlandTechnology_300x115px.png\" width=\"225\" height=\"\" alt=\"Garland Technology is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Garland Technology<\/strong><br \/>\nGarland Technology is an industry leader of IT and OT network solutions for enterprise, critical infrastructures, and government agencies worldwide. Since 2011, Garland Technology has been engineering and manufacturing simple, reliable, and affordable Network TAPs and Network Packet Brokers in the USA. For help identifying the right IT \/ OT network visibility solutions for projects large and small, or to learn more about the inventor of the first bypass technology, visit <strong><a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3291940-1&amp;h=4192818674&amp;u=http%3A%2F%2Fwww.garlandtechnology.com%2F&amp;a=GarlandTechnology.com\" target=\"_blank\" rel=\"noopener\">GarlandTechnology.com<\/a><\/strong> or <strong><a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3291940-1&amp;h=3869356824&amp;u=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fgarland-technology-llc&amp;a=%40garland-technology-llc\" target=\"_blank\" rel=\"noopener\">@garland-technology-llc<\/a><\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107439dc { opacity: 1; }#ut_am_wrap_69e7b107439dd .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107439dd .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107439dd { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107439dd { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107439dd { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107439dd\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107439de\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.fmapprovals.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107439dc\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/08\/FM-Approvals_logo2024_350x57px.png\" width=\"300\" height=\"\" alt=\"FM Approvals is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About FM Approvals<\/strong><br \/>\nFM Approvals offers international certification services for products related to property risk mitigation. Recognized and respected across the globe, our certification assures that a product has been objectively tested and conforms to rigorous property loss prevention standards.<br \/>\nFM APPROVED certification mark products adhere to the highest standards in quality, technical integrity, and performance.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.fmapprovals.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.fmapprovals.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10743d52 { opacity: 1; }#ut_am_wrap_69e7b10743d53 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10743d53 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10743d53 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10743d53 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10743d53 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10743d53\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10743d54\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.dragos.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10743d52\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/dragos_300x69px.png\" width=\"200\" height=\"\" alt=\"Dragos is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Dragos<\/strong><br \/>\nDragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS\/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos\u2019s industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.dragos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.dragos.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658756682867{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107440e1 { opacity: 1; }#ut_am_wrap_69e7b107440e2 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107440e2 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107440e2 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107440e2 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107440e2 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107440e2\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107440e3\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.industrialdefender.com\/\" ><div class=\"ut-animated-image-zoom\"><img loading=\"lazy\" decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107440e1\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 60'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/industrial-defender_300x60px.png\" width=\"300\" height=\"60\" alt=\"Industrial Defender is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Industrial Defender<\/strong><br \/>\nIndustrial Defender protects the world\u2019s critical infrastructure from cyberattacks. As the leader in OT cybersecurity innovation, the company\u2019s scalable platform is used by the largest organizations in the world to empower security stakeholders with actionable data about their OT and IIoT infrastructure, enabling them to make informed risk management decisions.<\/p>\n<p><strong>Learn more at <a href=\"https:\/\/www.industrialdefender.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.industrialdefender.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1074476d { opacity: 1; }#ut_am_wrap_69e7b1074476e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1074476e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1074476e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1074476e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1074476e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1074476e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074476f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/cloud.google.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1074476d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 185 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/08\/Google-Cloud-Security_250x129px.png\" width=\"185\" height=\"\" alt=\"Google Cloud Security is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Google Cloud Security<\/strong><br \/>\nTransform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation. With Google Cloud, you can prevent, detect, investigate and respond to security incidents before they impact your business, and build on the most trusted, secure cloud to drive your organization\u2019s digital transformation.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/cloud.google.com\/\" target=\"_blank\" rel=\"noopener\">cloud.google.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658756682867{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10744ac3 { opacity: 1; }#ut_am_wrap_69e7b10744ac4 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10744ac4 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10744ac4 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10744ac4 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10744ac4 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10744ac4\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10744ac5\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/industrialcyber.co\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10744ac3\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/industrial-cyber_300x149px.png\" width=\"200\" height=\"\" alt=\"Industrial Cyber is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About IndustrialCyber.co <\/strong><br \/>\nIndustrialCyber.co is a publication dedicated to providing news and features on everything happening in Industrial Cybersecurity. It is a valuable meeting place for OT\/ICS\/IIoT professionals and cybersecurity experts, cybersecurity vendors and industry influencers, who learn from one another and shape the future of this dynamic and critically important market.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.industrialcyber.co\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.industrialcyber.co<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1690219260995{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10745132 { opacity: 1; }#ut_am_wrap_69e7b10745133 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10745133 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10745133 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10745133 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10745133 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10745133\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10745134\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.mandiant.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10745132\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/08\/Mandiant_NowPartofGoogleCloud_275x55px.png\" width=\"250\" height=\"\" alt=\"Mandiant is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Mandiant<\/strong><br \/>\n<strong>Google Cloud Security<\/strong> provides frontline intelligence and assistance from <strong>Mandiant<\/strong> to help you prevent and respond to security incidents, a modern, cloud-native platform to drive your <strong>security operations<\/strong>, and a secure-by-design, secure-by-default <strong>cloud platform<\/strong> for your organization\u2019s digital transformation. And we have built our platforms and products to defend your most critical data, applications and communications to work as you do \u2013 across the cloud, your enterprise, and any type of device, at any scale.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.mandiant.com\/\" target=\"_blank\" rel=\"noopener\">www.mandiant.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10745da1 { opacity: 1; }#ut_am_wrap_69e7b10745da2 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10745da2 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10745da2 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10745da2 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10745da2 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10745da2\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10745da3\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.keysight.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10745da1\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 240 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/08\/keysight-logo_300x69px.png\" width=\"240\" height=\"\" alt=\"Keysight Technologies is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Keysight Technologies<\/strong><br \/>\nKeysight is at the forefront of technology innovation, delivering breakthroughs and trusted insights to the world\u2019s visionaries and innovators in network security, electronic design, test, manufacturing, and optimization. We create world-class solutions in security, wireless communications, 5G, automotive, quantum, aerospace, defense and semiconductor markets in over 100 countries.<\/p>\n<p>In 2016, Keysight transformed the company structure from product-focused divisions to industry-focused solution organizations, enabling closer customer alignment. This allows us to partner closely with market leaders to enable new technologies and provide first-to-market solutions for emerging applications. Our solution-centric industry groups provide end-to-end design, test and optimization solutions driven by customer specifications and timetables.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.keysight.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.keysight.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658756682867{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107460df { opacity: 1; }#ut_am_wrap_69e7b107460e0 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107460e0 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107460e0 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107460e0 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107460e0 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107460e0\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107460e1\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.missionsecure.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107460df\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 190 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/08\/mission-secure_300x116px.png\" width=\"190\" height=\"\" alt=\"Mission Secure is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Mission Secure<\/strong><br \/>\nWe are a team united and driven by one mission. To stop OT cyber threats and protect critical operations. Our people, patented technology, and customers power Mission Secure. We believe Mission Secure is the new standard in OT cyber-protection. Military strength, industrial-grade OT protection backed by industry experts to stop cyber threats head-on.<br \/>\nWe\u2019ll show you how Mission Secure can support your operational technology (OT) cybersecurity journey, where we can fit into your unique OT network, and how we can help you stop OT cyber threats head-on.<br \/>\nFrom your first visit to our website to your first virtual meeting with our sales team, we\u2019ll show you:<br \/>\nHow to mature your current OT cybersecurity program<br \/>\nHow to improve your compliance with industry frameworks<br \/>\nHow to minimize your OT cyber risks, and not only detect but stop OT cyber threats<br \/>\nHow we can augment your team to keep an eye on your OT cybersecurity 24\/7<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.missionsecure.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.missionsecure.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1632918388266{margin-bottom: -50px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10746780 { opacity: 1; }#ut_am_wrap_69e7b10746781 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10746781 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10746781 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10746781 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10746781 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10746781\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10746782\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.nccgroup.com\/dk-en\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10746780\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/ncc-group_logo_800x600px.png\" width=\"300\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About NCC Group<\/strong><br \/>\nHeadquartered in Manchester, UK, with over 35 offices across the world, NCC Group employs more than 2,000 people and is a trusted advisor to 15,000 clients worldwide.<\/p>\n<p>We assess, develop and manage cyber threats across our increasingly connected society. We advise global technology, manufacturers, financial institutions, critical national infrastructure providers, retailers and governments on the best way to keep businesses, software and personal data safe.<\/p>\n<p>With our knowledge, experience and global footprint, we are best placed to help businesses identify, assess, mitigate &amp; respond to the risks they face.<\/p>\n<p>We are passionate about making the Internet safer and revolutionising the way in which organisations think about cyber security.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.nccgroup.com\/dk-en\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.nccgroup.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754674514{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10746a7a { opacity: 1; }#ut_am_wrap_69e7b10746a7b .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10746a7b .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10746a7b { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10746a7b { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10746a7b { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10746a7b\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10746a7c\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.opswat.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10746a7a\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/OPSWAT_300x47px.png\" width=\"200\" height=\"\" alt=\"OPSWAT is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About OPSWAT.<\/strong><br \/>\nTrust no file. Trust no device.\u2122<br \/>\n19+ years\u2026 400+ employees\u2026 9 offices around the world\u2026 over 1,000 customers\u2026 2 platforms offering 8 solutions for comprehensive cybersecurity\u2026 13 patents\u2026 100+ partners\u2026 these are just a few of the numbers that tell the OPSWAT story.<br \/>\nThe net-net? We are cybersecurity experts driven to provide the most effective threat prevention technology possible, no matter where you are in the world.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.opswat.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.opswat.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753148429{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10746d8d { opacity: 1; }#ut_am_wrap_69e7b10746d8e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10746d8e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10746d8e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10746d8e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10746d8e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10746d8e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10746d8f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/omicroncybersecurity.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10746d8d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 250 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/05\/omicron_logo_300x83px.png\" width=\"250\" height=\"\" alt=\"Omicron is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About OMICRON<\/strong><br \/>\nOMICRON is a leading provider of cybersecurity solutions for power utility communication systems. We offer tailored cybersecurity solutions that are effective and meet the unique needs of these OT networks. With an overview of utility automation systems, we can assess power grid networks, identify risks and threats, and offer effective protection. Our experienced team is ready to assist in the event of a security incident and provide effective solutions to minimize the impact on your network.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/omicroncybersecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.omicroncybersecurity.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753148429{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10746ea3 { opacity: 1; }#ut_am_wrap_69e7b10746ea4 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10746ea4 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10746ea4 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10746ea4 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10746ea4 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10746ea4\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10746ea5\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.nozominetworks.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10746ea3\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 240 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/Nozomi-Networks_275x76.png\" width=\"240\" height=\"\" alt=\"Nozomi Networks is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Nozomi Networks<\/strong><br \/>\nNozomi Networks protects the world\u2019s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.nozominetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.nozominetworks.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754674514{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10747198 { opacity: 1; }#ut_am_wrap_69e7b10747199 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10747199 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10747199 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10747199 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10747199 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10747199\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074719a\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.rockwellautomation.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10747198\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 300 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/07\/rockwell-automation_350x81px.png\" width=\"300\" height=\"\" alt=\"Rockwell Automation is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Rockwell Automation<\/strong><br \/>\nRockwell Automation is a global leader in industrial automation and digital transformation. We connect the imaginations of people with the potential of technology to expand what is humanly possible, making the world more productive, more sustainable, and safer. With the right expertise, and approximately 26,000 talented employees, we bring world-class cybersecurity solution partnerships to meet your most complex challenges. To learn more about how we deliver value to our customers, visit <strong><a href=\"https:\/\/www.rockwellautomation.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.rockwellautomation.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658754674514{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10747718 { opacity: 1; }#ut_am_wrap_69e7b10747719 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10747719 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10747719 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10747719 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10747719 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10747719\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074771a\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.rubrik.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10747718\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/08\/rubrik_300x88px.png\" width=\"225\" height=\"\" alt=\"Rubrik is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Rubrik<\/strong><br \/>\nRubrik, the Zero Trust Data Security Company\u2122, delivers data security and operational resilience for enterprises. Rubrik\u2019s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.rubrik.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.rubrik.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107477e5 { opacity: 1; }#ut_am_wrap_69e7b107477e6 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107477e6 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107477e6 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107477e6 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107477e6 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107477e6\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107477e7\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"http:\/\/www.siemens.com\/cybersecurity\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107477e5\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/Siemens_283x45px.png\" width=\"200\" height=\"\" alt=\"Siemens is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>Cybersecurity at Siemens<\/strong><br \/>\nProtect what you value \u2013 with a holistic approach and leading technology expertise.<br \/>\nWith us you get a focus on the important entities affected by NIS 2 Directive, and we are continuously working on reinforcing the comprehensive protection among products, solutions, and services.<\/p>\n<p><strong>Building <\/strong><br \/>\nImprove your building network security \u2013 with the latest developments in building protocols, through IT best practices and easy integration with existing IT infrastructure.<\/p>\n<p>We ensure that our information security management systems (ISMS) adhere to the highest international standards. This includes ISO\/IEC 27001 certification for our common Remote Service Platform (cRSP) and cloud-based data management platform, Navigator.<\/p>\n<p><strong>Grid<\/strong><br \/>\nSecurity by design for your grid \u2013 to cope with the increasing demands in a scalable manner based on international standards.<\/p>\n<p>Secure systems are vital for critical infrastructure. We offer well designed products, systems, and solutions to ensure the security of the energy infrastructure including stringent security requirements of the BDEW, IEC 62443, IEC 62351, and NERC CIP.<\/p>\n<p><strong>Industry<\/strong><br \/>\nProven concept securing your industry \u2013 from the operational to the field level and from the protection of data to secure communication.<\/p>\n<p>With &#8220;Defense in Depth&#8221;, Siemens provides a multilayer security concept that gives plant operators, integrators, and component manufacturers all-round and in-depth protection as recommended by the international standard IEC 62443.<\/p>\n<p>We draw on experience from our own production plants and incorporate the latest knowledge about cyber treats into our products and services and when necessary, Security Advisories also inform you of current threats to your company and any necessary updates to our products.<\/p>\n<p><strong>For more information: <a href=\"http:\/\/www.siemens.com\/cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">www.siemens.com\/cybersecurity<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10747888 { opacity: 1; }#ut_am_wrap_69e7b10747889 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10747889 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10747889 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10747889 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10747889 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10747889\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074788a\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/securiot.dk\/frontpage\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10747888\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/securiot_250x60px.png\" width=\"200\" height=\"\" alt=\"SecuriOT is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About SecuriOT<\/strong><br \/>\nSecuriOT is specialized in cyber security for OT\/ICS environments.<\/p>\n<p>As a company recognized for its high level of dedication to and expertise in the OT\/ICS niche, SecuriOT is the &#8220;trusted advisor&#8221; and preferred partner for OT cyber security of organizations running <em>critical infrastructure and critical control systems<\/em>.<\/p>\n<p>SecuriOT delivers a variety of recognized industry <em>leading solutions, consultancy and services<\/em> to help secure production systems (OT\/ICS) against cyber threats.<br \/>\nIn addition to that SecuriOT has developed internationally recognized <em>software tools<\/em> supporting OT security teams in their <em>risk assessment and management<\/em> work.<\/p>\n<p>An important foundation for SecuriOTs business approach is that OT-security is not just fixed with a quick analysis or a network component. It is a continuous process to ensure security at the right level, and it often requires a new mindset, greater visibility and a better understanding of the cyber threats against your company.<br \/>\nThis is where SecuriOT creates value for our customers.<\/p>\n<p>SecuriOT is a part of <a href=\"https:\/\/www.novotek.com\/\" target=\"_blank\" rel=\"noopener\">NOVOTEK Group<\/a>.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/securiot.dk\/frontpage\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.security.dk<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10747d74 { opacity: 1; }#ut_am_wrap_69e7b10747d75 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10747d75 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10747d75 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10747d75 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10747d75 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10747d75\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10747d76\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/secolve.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10747d74\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 150 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/08\/Secolve_logo_160x167.png\" width=\"150\" height=\"\" alt=\"Secolve is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Secolve<\/strong><br \/>\nSecolve are the OT security specialists, partnering with organisations of all sizes to safeguard critical infrastructure from cyber threats. Our team of OT experts use a risk-based approach to tailor strategies to meet your unique needs. Cyber-attacks on critical infrastructure are on the rise and could have significant impacts for your organisation and surrounding community.<\/p>\n<p>We built OT-SAT, a video-based training platform, for critical infrastructure teams to get cyber aware on-demand to suit their busy schedules.<\/p>\n<p>Our training has been created by leading experts in the field and is already uplifting cyber security awareness in mining, manufacturing, and energy companies across Australia and globally.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/secolve.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.secolve.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753200708{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1074822d { opacity: 1; }#ut_am_wrap_69e7b1074822e .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1074822e .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1074822e { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1074822e { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1074822e { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1074822e\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074822f\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.sans.org\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1074822d\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/SANS-GIAC-Blue_300x84px.png\" width=\"200\" height=\"\" alt=\"SANS Institute is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About SANS Institute<\/strong><br \/>\nSANS Institute is the world\u2019s largest provider of cyber security training. For over twenty-five years, we\u2019ve provided cutting edge training to governments and organisations across the world. Technology may have changed in that time, but our core mission has remained constant: to protect through sharing cyber security knowledge and skills. SANS offers over 60 cyber security courses, operates across dozens of countries and has over 200,000 alumni. SANS training is built around a promise: students will be able to put into practice what they\u2019ve learned as soon as they get back to their desk.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.sans.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.sans.org<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753200708{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10748505 { opacity: 1; }#ut_am_wrap_69e7b10748506 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10748506 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10748506 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10748506 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10748506 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10748506\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10748507\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/sysctl.se\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10748505\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/sysctl_350x42px.png\" width=\"225\" height=\"\" alt=\"Sysctl is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Sysctl<\/strong><br \/>\nWe develop cyber security products because we are security geeks. If you should add up all of us, we have more than 60 years of experience in cyber security as consultants and advisors.<br \/>\nOur product range has come to life because of our own needs. Our web based secure file transfer appliance Deaddrop was invented out of necessity to transfer sensitive and confidential information to clients, who were missing a secure way to receive the data. Our USB kiosk Impex has about the same story, but for movable media, as a versatile tool for perimeter protection.<br \/>\nAll our products are developed in Sweden but our customers can be found all over Europe.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/sysctl.se\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.sysctl.se<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753200708{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10748743 { opacity: 1; }#ut_am_wrap_69e7b10748744 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10748744 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10748744 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10748744 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10748744 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10748744\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10748745\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.tenable.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10748743\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/05\/tenable_logo_300x66px.png\" width=\"200\" height=\"\" alt=\"Tenable is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Tenable<\/strong><br \/>\nTenable\u00ae is the Exposure Management company. More than 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus\u00ae, Tenable extended its expertise in vulnerabilities to deliver the world\u2019s first platform to see and secure any digital asset on any computing platform. Tenable OT Security (formerly Tenable.ot) eliminates silos across IT Security and OT operations by centralizing visibility for both practices, enabling organizations to mitigate risk across their entire attack surface, including cyber physical systems.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.tenable.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.tenable.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1632918397348{margin-bottom: -50px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10748b56 { opacity: 1; }#ut_am_wrap_69e7b10748b57 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10748b57 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10748b57 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10748b57 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10748b57 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10748b57\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10748b58\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.trendmicro.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10748b56\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2021\/09\/trend-micro_logo_800x600px.png\" width=\"225\" height=\"\" alt=\"\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Trend Micro<\/strong><br \/>\nTrend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.<\/p>\n<p>As a leader in cloud and enterprise cybersecurity, our platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response.<\/p>\n<p>With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.trendmicro.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753803110{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b1074908a { opacity: 1; }#ut_am_wrap_69e7b1074908b .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b1074908b .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b1074908b { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b1074908b { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b1074908b { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b1074908b\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b1074908c\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/treschowson.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b1074908a\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 325 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/10\/treschow-son_logo_grey_810x123px.png\" width=\"325\" height=\"\" alt=\"Treschow&amp;Son is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Treschow&amp;Son<\/strong><br \/>\nWe connect Clients with Talents and Talents with Opportunities<br \/>\nTreschow&amp;Son is a cybersecurity talent management company offering services within Talent Building and Talent Broking. We are here to help organisations mobilize the right cyber talents within a competitive and scarce market.<\/p>\n<p>With extensive experience and knowledge in Talent Broking and Talent Building, we have made it our mission to bring industry people to the next level for the good of themselves, their employer, and the common cause \u2013 cybersecurity.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/treschowson.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.treschowson.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658753200708{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10749706 { opacity: 1; }#ut_am_wrap_69e7b10749707 .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10749707 .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10749707 { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10749707 { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10749707 { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10749707\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10749708\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.trinity-ot.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10749706\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 225 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/09\/trinity-ot-security_white_300x67px.png\" width=\"225\" height=\"\" alt=\"Trinity OT Security is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About Trinity OT Security<\/strong><br \/>\nOur customers are often faced with a lack of assurance over the security of their OT environments and have doubts about the efficacy of OT security arrangements, exacerbated by an increasing level of risk to these environments, and constraints on OT protection.We work with our customers and trusted partners in order to:<br \/>\nAssure OT\/ICS environments<br \/>\nMeasure and prioritise OT\/ICS risks<br \/>\nEnable holistic OT\/ICS protection<br \/>\nProvide experienced OT\/ICS Security consultants &amp; personnel<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.trinity-ot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.trinity-ot.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b107499ae { opacity: 1; }#ut_am_wrap_69e7b107499af .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b107499af .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b107499af { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b107499af { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b107499af { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b107499af\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b107499b0\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.withsecure.com\/en\/home\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b107499ae\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 200 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2022\/07\/WithSecure_300x68px.png\" width=\"200\" height=\"\" alt=\"WithSecure is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About WithSecure\u2122<\/strong><br \/>\nWithSecure\u2122, formerly F-Secure Business, is cyber security\u2019s reliable partner. IT service providers, MSSPs and businesses \u2013 along with the largest financial institutions, manufacturers, and thousands of the world\u2019s most advanced communications and technology providers \u2013 trust us for outcome-based cyber security that protects and enables their operations. Our AI-driven protection secures endpoints and cloud collaboration, and our intelligent detection and response are powered by experts who identify business risks by proactively hunting for threats and confronting live attacks. Our consultants partner with enterprises and tech challengers to build resilience through evidence-based security advice. With more than 30 years of experience in building technology that meets business objectives, we\u2019ve built our portfolio to grow with our partners through flexible commercial models.<br \/>\nWithSecure\u2122 Corporation was founded in 1988, and is listed on NASDAQ OMX Helsinki Ltd.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.withsecure.com\/en\/home\" target=\"_blank\" rel=\"noopener noreferrer\">www.withsecure.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10749a6c { opacity: 1; }#ut_am_wrap_69e7b10749a6d .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10749a6d .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10749a6d { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10749a6d { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10749a6d { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10749a6d\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10749a6e\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.xonasystems.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10749a6c\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 175 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/05\/xona_logo-2024_250x57px.png\" width=\"175\" height=\"\" alt=\"XONA is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<strong>About XONA<\/strong><br \/>\nXONA enables frictionless user access that\u2019s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA\u2019s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.<\/p>\n<p>With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.xonasystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.xonasystems.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658752666068{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;]<div  class=\"wpb_content_element   clearfix\"><style type=\"text\/css\">#ut_am_69e7b10749fdc { opacity: 1; }#ut_am_wrap_69e7b10749fdd .ut-image-gallery-item-caption-title h3 { letter-spacing: 0em; }#ut_am_wrap_69e7b10749fdd .ut-gallery-slider-caption { font-weight: bold; }#ut_am_wrap_69e7b10749fdd { text-align: center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_am_wrap_69e7b10749fdd { text-align: center !important; } }@media (max-width: 767px) { #ut_am_wrap_69e7b10749fdd { text-align: center !important; } }<\/style><div id=\"ut_am_wrap_69e7b10749fdd\" class=\"ut-image-gallery-image \"><div id=\"ut_reveal_69e7b10749fde\"  data-appear-top-offset=\"auto\" class=\"ut-animated-image-item ut-image-gallery-item ut-animation-done \"><a target=\"_blank\" href=\"https:\/\/www.zscaler.com\/\" ><div class=\"ut-animated-image-zoom\"><img decoding=\"async\" class=\"ut-lazy skip-lazy ut-animated-image\"  id=\"ut_am_69e7b10749fdc\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 275 600'%2F%3E\" data-src=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2024\/11\/zscaler_logo_350x73px.png\" width=\"275\" height=\"\" alt=\"Zscaler is partner at Industrial Security Conference Copenhagen - Insight IT\"\/><\/div><\/a><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<strong>About Zscaler<\/strong><br \/>\nZscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange\u2122 platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SSE-based Zero Trust Exchange\u2122 is the world\u2019s largest in-line cloud security platform.<\/p>\n<p><strong>For more information: <a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.zscaler.com<\/a><\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_empty_space][vc_empty_space height=&#8221;30px&#8221;][ut_title_divider_2 divider=&#8221;bklyn-divider-style-3&#8243; align=&#8221;center&#8221; color=&#8221;#f9922d&#8221;]IN PARTNERSHIP WITH[\/ut_title_divider_2][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658755576889{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]About ISACA ISACA Denmark Chapter represents the international organization ISACA.ORG. As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Partners - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/partners\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Partners - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_empty_space][vc_empty_space height=&#8221;30px&#8221;][ut_title_divider_2 divider=&#8221;bklyn-divider-style-3&#8243; align=&#8221;center&#8221; color=&#8221;#f9922d&#8221;]IN PARTNERSHIP WITH[\/ut_title_divider_2][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658755576889{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]About ISACA ISACA Denmark Chapter represents the international organization ISACA.ORG. As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/partners\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T15:04:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"55 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/partners\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/partners\/\",\"name\":\"Partners - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2021-08-26T12:57:19+00:00\",\"dateModified\":\"2026-03-13T15:04:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/partners\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/partners\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/partners\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Partners\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Partners - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/partners\/","og_locale":"en_GB","og_type":"article","og_title":"Partners - Industrial Security Conference Copenhagen","og_description":"[vc_row][vc_column][vc_empty_space][vc_empty_space height=&#8221;30px&#8221;][ut_title_divider_2 divider=&#8221;bklyn-divider-style-3&#8243; align=&#8221;center&#8221; color=&#8221;#f9922d&#8221;]IN PARTNERSHIP WITH[\/ut_title_divider_2][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658755576889{margin-top: 10px !important;margin-bottom: 0px !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]About ISACA ISACA Denmark Chapter represents the international organization ISACA.ORG. As a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse community of more than 140,000 professionals worldwide with the tools they need to [&hellip;]","og_url":"https:\/\/insightevents.dk\/isc-cph\/partners\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2026-03-13T15:04:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"55 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/partners\/","url":"https:\/\/insightevents.dk\/isc-cph\/partners\/","name":"Partners - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2021-08-26T12:57:19+00:00","dateModified":"2026-03-13T15:04:11+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/partners\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/partners\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/partners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Partners"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages\/150"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages\/150\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}