{"id":181,"date":"2021-09-01T17:43:58","date_gmt":"2021-09-01T15:43:58","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?page_id=181"},"modified":"2025-06-11T13:10:12","modified_gmt":"2025-06-11T11:10:12","slug":"program","status":"publish","type":"page","link":"https:\/\/insightevents.dk\/isc-cph\/program\/","title":{"rendered":"Program: Industrial Security Conference Copenhagen"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section][vc_row][vc_column]<style type=\"text\/css\">#ut_custom_heading69e73973d936f { color:#fd7014; }#ut_custom_heading69e73973d936f { text-align:center; }@media (min-width: 768px) and (max-width: 1024px) { #ut_custom_heading69e73973d936f { text-align:center; } }@media (max-width: 767px) { #ut_custom_heading69e73973d936f { text-align:center; } }<\/style><h1 id=\"ut_custom_heading69e73973d936f\" class=\"ut-custom-heading-module  \" ><span class=\"\" >Program<\/span><\/h1><div class=\"wpb_content_element\"><style type=\"text\/css\">#ut_tabs_style_69e73973f2c33 .bkly-icon-tab-label {font-size: 18px; }#ut_tabs_style_69e73973f2c33 .bkly-icon-tab-label {text-transform: capitalize; }#ut_tab_style_69e73973d93d2 a .bkly-icon-tab-label {color: #0a0a0a; }#ut_tab_style_69e73973d93d2 a:hover .bkly-icon-tab-label {color: #fd7014; }#ut_tab_style_69e73973d93d2.active a .bkly-icon-tab-label {color: #fd7014; }#ut_tab_style_69e73973e20be a .bkly-icon-tab-label {color: #0a0a0a; }#ut_tab_style_69e73973e20be a:hover .bkly-icon-tab-label {color: #fd7014; }#ut_tab_style_69e73973e20be.active a .bkly-icon-tab-label {color: #fd7014; }#ut_tab_style_69e73973ec145 a .bkly-icon-tab-label {color: #0a0a0a; }#ut_tab_style_69e73973ec145 a:hover .bkly-icon-tab-label {color: #fd7014; }#ut_tab_style_69e73973ec145.active a .bkly-icon-tab-label {color: #fd7014; }<\/style><div id=\"ut_tabs_style_69e73973f2c33\" class=\"bklyn-icon-tabs-wrap bklyn-icon-tabs-center\"><ul class=\"bklyn-icon-tabs nav nav-tabs\"><li id=\"ut_tab_style_69e73973d93d2\" class=\"active\"><a href=\"#ut_tab_69e73973d93d0\" data-toggle=\"tab\"><span class=\"bkly-icon-tab \"><\/span><span class=\"bkly-icon-tab-label \">MONDAY, NOVEMBER 10<\/span><\/a><\/li><li id=\"ut_tab_style_69e73973e20be\" ><a href=\"#ut_tab_69e73973e20bc\" data-toggle=\"tab\"><span class=\"bkly-icon-tab \"><\/span><span class=\"bkly-icon-tab-label \">TUESDAY, NOVEMBER 11<\/span><\/a><\/li><li id=\"ut_tab_style_69e73973ec145\" ><a href=\"#ut_tab_69e73973ec142\" data-toggle=\"tab\"><span class=\"bkly-icon-tab \"><\/span><span class=\"bkly-icon-tab-label \">WEDNESDAY, NOVEMBER 12<\/span><\/a><\/li><\/ul><div class=\"tab-content\"><div data-size=\"auto\" class=\"tab-pane fade  active\" id=\"ut_tab_69e73973d93d0\"> <div class=\"tec-schedule-wrapper \"><table class=\"tec-schedule tec-color-scheme-light tec-layout-table\" border=\"0\"><thead><tr><th class=\"tec-col-time\">Time<\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Main Track<\/span> <span class=\"tec-track-description\"><\/span> <\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Danish Track<\/span> <span class=\"tec-track-description\"><\/span> <\/th><\/tr><\/thead><tbody><tr class=\"tec-time-800\"><td class=\"tec-time\">8:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-custom tec-session-welcome-registration-networking-and-breakfast\" data-track-title=\"Main Track\" data-session-id=\"2901\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Welcome \u2013 Registration, networking and breakfast<\/span><\/h3><div class=\"tec-session-content\">Register at the conference reception, receive your nametag, and conference material. Enjoy breakfast buffet with coffee and tea.<\/div><\/div><!-- 2901 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-custom tec-session-velkommen-til-industrial-security-conference\" data-track-title=\"Danish Track\" data-session-id=\"2907\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Velkommen til Industrial Security Conference<\/span><\/h3><div class=\"tec-session-content\">Udlevering af navneskilte og deltagermateriale. Ny en let morgenanretning med kaffe og te.<\/div><\/div><!-- 2907 --><\/td><\/tr><tr class=\"tec-time-900\"><td class=\"tec-time\">9:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-introduction-to-the-conference\" data-track-title=\"Main Track\" data-session-id=\"1882\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/introduction-to-the-conference\/\">Introduction to the conference and today&#8217;s program<\/a><\/h3><div class=\"tec-session-content\">Chairman James R. McQuiggan, Security Awareness Advocate, KnowBe4 introduces the conference and today\u2019s program.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 1882 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-introduktion-til-konferencen\" data-track-title=\"Danish Track\" data-session-id=\"1871\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/introduktion-til-konferencen\/\">Introduktion til konferencen og dagens program<\/a><\/h3><div class=\"tec-session-content\">Introduktion ved ordstyrerne Peter Fr\u00f8kj\u00e6r, Senior Security Architect, Vestas &amp; President, ISACA Denmark &amp; Michael Refskou Poulsen, Cyber Security Specialist, Evida Service<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tPeter Fr\u00f8kj\u00e6r\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Security Architect, Vestas, & President, ISACA Denmark\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMichael Refskou Poulsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCyber Security Specialist, Evida Service\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 1871 --><\/td><\/tr><tr class=\"tec-time-905\"><td class=\"tec-time\">9:05<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-strengthening-governance-risk-and-compliance-in-ot-security\" data-track-title=\"Main Track\" data-session-id=\"3057\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/strengthening-governance-risk-and-compliance-in-ot-security\/\">Strengthening Governance, Risk and Compliance in OT Security<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>In this presentation, we will discuss how to identify OT Cyber-Physical Risks and build a resilient compliance frameworks that are not a one-time effort, but a continuous process. In this session, we will explore best practices for ongoing monitoring, risk assessment, and mitigation \u2013 integrating compliance checks designed to help ensure that organizations stay ahead of both regulatory changes and the shifting threat landscape.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tSaltanat Mashirova\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Cybersecurity Lead, CPX\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3057 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-beredskab-og-beskyttelse-af-dansk-kritisk-infrastruktur\" data-track-title=\"Danish Track\" data-session-id=\"3070\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/beredskab-og-beskyttelse-af-dansk-kritisk-infrastruktur\/\">Beredskab og beskyttelse af dansk kritisk infrastruktur<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTorsten Schack Pedersen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tMinister for samfundssikkerhed og beredskab, Ministeriet for Samfundssikkerhed og Beredskab\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3070 --><\/td><\/tr><tr class=\"tec-time-930\"><td class=\"tec-time\">9:30<\/td><td class=\"tec-session-empty\"><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-custom tec-session-netvaerkspause-med-forfriskninger\" data-track-title=\"Danish Track\" data-session-id=\"1897\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Netv\u00e6rkspause med forfriskninger<\/span><\/h3><\/div><!-- 1897 --><\/td><\/tr><tr class=\"tec-time-950\"><td class=\"tec-time\">9:50<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-custom tec-session-short-break\" data-track-title=\"Main Track\" data-session-id=\"1944\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short Break<\/span><\/h3><\/div><!-- 1944 --><\/td><td class=\"tec-session-empty\"><\/td><\/tr><tr class=\"tec-time-1000\"><td class=\"tec-time\">10:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-safety-critical-cloud-based-systems-a-survey-of-design-options\" data-track-title=\"Main Track\" data-session-id=\"3060\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/safety-critical-cloud-based-systems-a-survey-of-design-options\/\">Safety-Critical Cloud-Based Systems \u2013 a survey of design options<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Advanced<\/em><\/p>Delegates will learn; Key risks in cloud and AI-based safety-critical systems, design patterns to mitigate these risks and security trade-offs and recommendations for different criticality levels<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tAndrew Ginter\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP Industrial Security, Waterfall Security\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3060 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-hvad-er-truslen-mod-den-danske-kritiske-infrastruktur\" data-track-title=\"Danish Track\" data-session-id=\"3072\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/hvad-er-truslen-mod-den-danske-kritiske-infrastruktur\/\">Hvad er truslen mod den danske kritiske infrastruktur?<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJakob Witt\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSektionschef, Trusselsvurderingsenheden, Styrelsen for Samfundssikkerhed\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3072 --><\/td><\/tr><tr class=\"tec-time-1040 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">10:40<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-refreshments-and-networking\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"1940\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 1940 --><\/td><\/tr><tr class=\"tec-time-1110\"><td class=\"tec-time\">11:10<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-implementing-secure-by-design-frameworks-in-ot-environments\" data-track-title=\"Main Track\" data-session-id=\"3064\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/implementing-secure-by-design-frameworks-in-ot-environments\/\">Implementing Secure-By-Design Frameworks in OT Environments<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>In this session, we will discuss the importance of OT security-by-design, how security should be injected throughout the production lifecycle, and share a case study and lessons learned from a recent real-world implementation.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tHatteras Hoops\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Security Delivery Lead, Europe, Booz Allen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3064 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-tilsynserfaringer-pa-baggrund-af-energistyrelsens-implementering-af-nis2\" data-track-title=\"Danish Track\" data-session-id=\"3074\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/tilsynserfaringer-pa-baggrund-af-energistyrelsens-implementering-af-nis2\/\">Tilsynserfaringer p\u00e5 baggrund af Energistyrelsens implementering af NIS2<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJesper Rode Tholstrup\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tKontorchef, Energistyrelsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3074 --><\/td><\/tr><tr class=\"tec-time-1150\"><td class=\"tec-time\">11:50<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-mastering-ot-decryption-before-its-too-late\" data-track-title=\"Main Track\" data-session-id=\"3066\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/mastering-ot-decryption-before-its-too-late\/\">Mastering OT Decryption Before It&#8217;s Too Late<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate \/ Advanced<\/em><\/p>You will learn why decryption is essential for modern OT networks, how to address the visibility blind spots introduced by encrypted traffic, common misconceptions about OT Decryption and actionable strategies for implementing decryption without compromising uptime or performance.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tNeil Wilkins\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tEMEA Technical Manager, Garland Technology\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3066 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-cyber-resilience-act-juridiske-krav-og-compliance\" data-track-title=\"Danish Track\" data-session-id=\"3076\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/cyber-resilience-act-juridiske-krav-og-compliance\/\">Cyber Resilience Act: Juridiske krav og compliance<\/a><\/h3><div class=\"tec-session-content\">Cyber Resilience Act (CRA) er en ny EU-forordning, der stiller juridiske krav til Cybersikkerheden i digitale produkter og tjenester, der g\u00f8res tilg\u00e6ngelige i EU. I opl\u00e6gget f\u00e5r du en gennemgang af de juridiske krav i CRA, med fokus p\u00e5 hvilke produkter og tjenester, der er omfattet, og hvordan virksomheder skal sikre compliance, f.eks. i forhold til kravene til dokumentation, risikostyring, sikkerhedsopdateringer og leverand\u00f8rstyring.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tEmil Bisgaard\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tPartner, Poul Schmidt \/ Kammeradvokaten\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3076 --><\/td><\/tr><tr class=\"tec-time-1230 tec-global-session tec-global-session-custom lunch-and-networking\"><td class=\"tec-time\">12:30<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-lunch-and-networking\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"1994\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Lunch and networking<\/span><\/h3><\/div><!-- 1994 --><\/td><\/tr><tr class=\"tec-time-1330\"><td class=\"tec-time\">13:30<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-is-the-energy-sector-cyber-secure-in-2025\" data-track-title=\"Main Track\" data-session-id=\"3187\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/is-the-energy-sector-cyber-secure-in-2025\/\">Is the energy sector Cyber Secure in 2025?<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner<\/em><\/p>This is DNV\u2019s third Energy Cyber Priority report. Research was carried out between September 2024 and January 2025. Survey respondents represent a range of functions within the industry, including those with in-depth knowledge of cybersecurity along with general managers and C-suite executives.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tBoye Tranum\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tDirector Cyber Security, DNV Cyber\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3187 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-erfaringer-fra-et-ransomware-angreb-fra-en-kommune\" data-track-title=\"Danish Track\" data-session-id=\"3078\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/erfaringer-fra-et-ransomware-angreb-fra-en-kommune\/\">Erfaringer fra et ransomware angreb fra en kommune<\/a><\/h3><div class=\"tec-session-content\">Karl Johansen, borgmester i Klaksvik Kommune p\u00e5 F\u00e6r\u00f8erne, fort\u00e6ller om oplevelsen af, hvordan det var at blive angrebet af ransomware.\r\nAnnilisa Arge Klevang, chefkonsulent, Nordatlanten hos Samsik fort\u00e6ller om truslen af ransomware, hvordan hackerne br\u00f8d ind, og hvad man kan g\u00f8re for at reducere risikoen for ransomware.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKarl Johansen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tBorgmester, Klaksv\u00edk Kommune\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tAnnilisa Arge Klevang\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tChefkonsulent, Nordatlanten, Styrelsen for Samfundssikkerhed\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3078 --><\/td><\/tr><tr class=\"tec-time-1410 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">14:10<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-short-break-2\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"1950\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short break<\/span><\/h3><\/div><!-- 1950 --><\/td><\/tr><tr class=\"tec-time-1420\"><td class=\"tec-time\">14:20<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-challenges-in-bringing-cybersecurity-to-rail-operational-systems\" data-track-title=\"Main Track\" data-session-id=\"3100\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/challenges-in-bringing-cybersecurity-to-rail-operational-systems\/\">Challenges in Bringing Cybersecurity to Rail Operational Systems<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner<\/em><\/p>You will gain a foundational understanding of the rail-specific threat landscape and learn how tailored cybersecurity strategies can improve resilience across the industry.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOmar Benjumea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tField CISO & Business Development, Cylus\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3100 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-fra-rapportering-til-teknisk-loesning\" data-track-title=\"Danish Track\" data-session-id=\"3120\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/fra-rapportering-til-teknisk-loesning\/\">Fra rapportering til teknisk l\u00f8sning<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Erfaring fra Danmarks f\u00f8rste CVE Numbering Authority (CNA) med opbygning af et centralt kontaktpunkt, hvor oplysninger om s\u00e5rbarheder i producentens produkt kan indberettes og modtages p\u00e5 en sikker m\u00e5de.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tAnette Svendsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCompliance Manager, Secomea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3120 --><\/td><\/tr><tr class=\"tec-time-1500 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">15:00<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-refreshments-and-networking-2\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"1954\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 1954 --><\/td><\/tr><tr class=\"tec-time-1525\"><td class=\"tec-time\">15:25<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-seeing-the-forest-for-the-trees-tracking-the-evolution-of-15-years-of-malicious-behavior-on-ot-ics\" data-track-title=\"Main Track\" data-session-id=\"3102\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/seeing-the-forest-for-the-trees-tracking-the-evolution-of-15-years-of-malicious-behavior-on-ot-ics\/\">Seeing the forest for the trees \u2013 Tracking the evolution of 15 years of malicious behavior on OT\/ICS<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Fifteen years after Stuxnet, OT\/ICS threats have evolved far beyond state-sponsored malware. This session tracks the broader landscape of malicious activity, from ransomware on engineering workstations to botnets targeting industrial routers. Using new data from honeypots and malware repositories, we highlight the real-world threats asset owners face today\u2014often overlooked in favor of high-profile attacks. Learn how attackers exploit perimeter devices, abuse OT protocols, wipe critical data, and infect legitimate OT software.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tDaniel dos Santos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tHead of Research, Forescout\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3102 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-hvordan-kan-vi-sikre-cyber-resiliens-i-vores-elnet-nu-og-i-fremtiden\" data-track-title=\"Danish Track\" data-session-id=\"3122\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/hvordan-kan-vi-sikre-cyber-resiliens-i-vores-elnet-nu-og-i-fremtiden\/\">Hvordan kan vi sikre Cyber resiliens i vores elnet \u2013 nu og i fremtiden?<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner\/Intermediate<\/em><\/p>I denne session vil Amalie L\u00f8nning fra Siemens pr\u00e6sentere nogle af de st\u00f8rste udfordringer, som fremtiden kigger ind i s\u00e5som det aktuelle trusselsbillede der er ved at arbejde med b\u00e5de de gamle og de nye elnet. Du f\u00e5r ogs\u00e5 et hurtigt realitetstjek af udviklingen i konvergensen mellem OT og IT, som er en foruds\u00e6tning for cybersikkerhed og hovedresultaterne fra en bredere unders\u00f8gelse: Hvor langt er man med cybersikkerhed hos DSO&#039;er og TSO&#039;er i Norden?\r\n<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tAmalie L\u00f8nning\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCybersecurity Portfolio Manager - Nordics, Siemens\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3122 --><\/td><\/tr><tr class=\"tec-time-1605 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">16:05<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-short-break-3\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"1958\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short break<\/span><\/h3><\/div><!-- 1958 --><\/td><\/tr><tr class=\"tec-time-1615\"><td class=\"tec-time\">16:15<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-imposing-a-cost-on-the-adversary-not-yourself\" data-track-title=\"Main Track\" data-session-id=\"3551\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/imposing-a-cost-on-the-adversary-not-yourself\/\">Imposing a Cost on the Adversary, not yourself<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>The realization that Critical National Infrastructure is at the point of a Hybrid War is apparent, with the well-publicised outcomes.\r\nHow to deliver an appropriate and proportionate Cyber solution into the Cyber Physical Environment requires careful consideration to ensure the functional integrity of the protected Assets?\r\nThis talk looks at how a Balanced Approach, founded on IEC-62443, has been used to impose a cost on the adversary which is viewed as an operational benefit and not a burden (cost).\r\nDelegates will learn how the foundational requirement of IEC-62443 has been delivered from a Governance Perspective, Operational Perspective whilst driving our Strategic Objective from the project itself.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tUmberto Cattaneo\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tEurope Regional Cyber Security Business Consultant Lead, Schneider Electric\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3551 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-kenneth-og-ot-sikkerhedsmonopolet\" data-track-title=\"Danish Track\" data-session-id=\"3124\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/kenneth-og-ot-sikkerhedsmonopolet\/\">Kenneth og OT-sikkerhedsmonopolet<\/a><\/h3><div class=\"tec-session-content\">Vi hj\u00e6lper dig med dit OT-sikkerheds dilemma \u2013 LIVE ON STAGE \u2026 det bedste dilemma premieres!<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tRene Levin\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO, Fjernvarme Fyn\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMikael Vingaard\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior OT Security Consultant, ICSRange\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMorten Kromann\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tHead of Product Development Special Projects, Grundfos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJens Christian Veders\u00f8\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tHead of Cyber Risk Management, Vestas\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKenneth B. J\u00f8rgensen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOwner, KCERT\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3124 --><\/td><\/tr><tr class=\"tec-time-1700\"><td class=\"tec-time\">17:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-the-chairman-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\" data-track-title=\"Main Track\" data-session-id=\"3111\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/the-chairman-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\/\">The chairman provides a summary of the day&#8217;s agenda and key learning outcomes<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3111 --><\/td><td colspan=\"1\" class=\"tec-track-danish tec-session-type-session tec-session-ordstyrerne-samler-op-pa-konferencens-forste-dag\" data-track-title=\"Danish Track\" data-session-id=\"3126\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/ordstyrerne-samler-op-pa-konferencens-forste-dag\/\">Ordstyrerne samler op p\u00e5 konferencens f\u00f8rste dag<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tPeter Fr\u00f8kj\u00e6r\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Security Architect, Vestas, & President, ISACA Denmark\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMichael Refskou Poulsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCyber Security Specialist, Evida Service\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3126 --><\/td><\/tr><tr class=\"tec-time-1710 tec-global-session tec-global-session-custom networking-reception\"><td class=\"tec-time\">17:10<\/td><td colspan=\"2\" class=\"tec-track-danish tec-track-main tec-session-type-custom tec-session-networking-reception\" data-track-title=\"Danish Track, Main Track\" data-session-id=\"3114\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Networking reception<\/span><\/h3><div class=\"tec-session-content\">A networking reception with refreshments, offering the opportunity to connect with our partners.<\/div><\/div><!-- 3114 --><\/td><\/tr><\/tbody><\/table><\/div><\/div><div data-size=\"auto\" class=\"tab-pane fade  \" id=\"ut_tab_69e73973e20bc\"> <div class=\"tec-schedule-wrapper \"><table class=\"tec-schedule tec-color-scheme-light tec-layout-table\" border=\"0\"><thead><tr><th class=\"tec-col-time\">Time<\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Main Track<\/span> <span class=\"tec-track-description\"><\/span> <\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Workshop 1<\/span> <span class=\"tec-track-description\"><\/span> <\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Workshop 2<\/span> <span class=\"tec-track-description\"><\/span> <\/th><\/tr><\/thead><tbody><tr class=\"tec-time-800 tec-global-session tec-global-session-custom welcome-to-day-2-at-isc-cph\"><td class=\"tec-time\">8:00<\/td><td colspan=\"3\" class=\"tec-track-danish tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-welcome-to-day-2\" data-track-title=\"Danish Track, Main Track, Workshop 1, Workshop 2\" data-session-id=\"1928\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Welcome to Day 2 at ISC-CPH<\/span><\/h3><div class=\"tec-session-content\">Enjoy a light breakfast buffet, coffee, tea and network with your security colleagues.<\/div><\/div><!-- 1928 --><\/td><\/tr><tr class=\"tec-time-900 tec-global-session tec-global-session-session introduction-to-todays-program\"><td class=\"tec-time\">9:00<\/td><td colspan=\"3\" class=\"tec-track-danish tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-introduction-to-todays-program\" data-track-title=\"Danish Track, Main Track, Workshop 1, Workshop 2\" data-session-id=\"1982\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/introduction-to-todays-program\/\">Introduction to today&#8217;s program<\/a><\/h3><div class=\"tec-session-content\">Chairman James R. McQuiggan, Security Awareness Advocate, KnowBe4 introduces today\u2019s program.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 1982 --><\/td><\/tr><tr class=\"tec-time-910\"><td class=\"tec-time\">9:10<\/td><td colspan=\"2\" class=\"tec-track-main tec-track-track-1 tec-session-type-session tec-session-hunting-at-scale-identifying-internet-connected-ot-devices\" data-track-title=\"Main Track, Workshop 1\" data-session-id=\"3080\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/hunting-at-scale-identifying-internet-connected-ot-devices\/\">Hunting at scale, identifying Internet connected OT devices<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>You&#039;ll walk away with new insights on the vast number of OT-species out there, and why we believe they should migrate away from the internet. Are you ready to join the expedition?<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tErwin Paternotte\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Technical Threat Analyst, NCSC-NL\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tNiels van Eijck\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Technical Threat Analyst, NCSC-NL\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3080 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-expanding-the-horizon-of-ids\" data-track-title=\"Workshop 2\" data-session-id=\"3285\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/expanding-the-horizon-of-ids\/\">Workshop: Expanding the Horizon of IDS<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner\/Intermediate<\/em><\/p>This workshop provides a hands-on introduction to Intrusion Detection Systems (IDS), focusing on network-based IDS (NIDS). \r\nIn this session you will get an introduction to IDS.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3285 --><\/td><\/tr><tr class=\"tec-time-950 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">9:50<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-short-break-4\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3031\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short break<\/span><\/h3><\/div><!-- 3031 --><\/td><\/tr><tr class=\"tec-time-1000\"><td class=\"tec-time\">10:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-study-on-high-impact-scenarios-with-escim\" data-track-title=\"Main Track\" data-session-id=\"3082\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/study-on-high-impact-scenarios-with-escim\/\">Study on High Impact Scenarios with ESCIM<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Learn how ESCIM supports training, incident preparedness, and alignment with the NIST framework for effective response and recovery.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMaite Carli Garc\u00eda\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCommunication Manager & European CCI Coordinator, CCI \u2013 Industrial Cybersecurity Center\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3082 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-workshop-ot-network-segmentation-from-planning-to-implementation\" data-track-title=\"Workshop 1\" data-session-id=\"3225\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\">Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Workshop Overview: This full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.\r\n<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3225 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-2-lab-1-setting-up-a-basic-ids\" data-track-title=\"Workshop 2\" data-session-id=\"3294\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-lab-1-setting-up-a-basic-ids\/\">Lab 1 &#8211; Setting Up a Basic IDS<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Installing and configuring Zeek, installing and configuring Suricata, installing and configuring ELK and preliminary testing<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3294 --><\/td><\/tr><tr class=\"tec-time-1040 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">10:40<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-refreshments-and-networking-3\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1990\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 1990 --><\/td><\/tr><tr class=\"tec-time-1110\"><td class=\"tec-time\">11:10<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-smart-systems-smarter-threats\" data-track-title=\"Main Track\" data-session-id=\"3128\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/smart-systems-smarter-threats\/\">Smart Systems, Smarter Threats<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner<\/em><\/p>Key insights include shifting from domain-based risk to business-driven criticality, building a shared risk language, and creating adaptive, audit-ready processes that are both practical and strategic.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tHedvig M\u00e5reng\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Security Consultant, \u00d8rsted\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3128 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-1-3-requirements-development-and-resource-planning\" data-track-title=\"Workshop 1\" data-session-id=\"3212\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/1-3-requirements-development-and-resource-planning\/\">Requirements Development and Resource Planning<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Developing technical requirements for OT firewalls based on operational needs, performance considerations for industrial environments, staffing and skills assessment for implementation and maintenance and budgeting and procurement considerations.\r\n<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3212 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-3-theory-analyzing-ids-logs-alerts\" data-track-title=\"Workshop 2\" data-session-id=\"3296\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/3-theory-analyzing-ids-logs-alerts\/\">Theory \u2013 Analyzing IDS Logs &#038; Alerts<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Generating alerts with simulated attacks, generating logs via PCAPs, understanding Snort and Suricata alert logs, analyzing Zeek logs for deeper network insights and visualizing results in Kibana<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3296 --><\/td><\/tr><tr class=\"tec-time-1150\"><td class=\"tec-time\">11:50<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-emergency-response-drills-in-practice-for-power-generation\" data-track-title=\"Main Track\" data-session-id=\"3130\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/emergency-response-drills-in-practice-for-power-generation\/\">Emergency Response Drills in Practice for Power Generation<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner<\/em><\/p>In the talk we will give you insight to why we did it, how we did it, pros vs cons and key learnings.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tLars Erik Smevold\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSecurity & Process Control Architect, Statkraft\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3130 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-1-4-project-planning-and-communication\" data-track-title=\"Workshop 1\" data-session-id=\"3216\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/1-4-project-planning-and-communication\/\">Project Planning and Communication<\/a><\/h3><div class=\"tec-session-content\">Keytakeaways: Creating an implementation roadmap with realistic milestones, identifying and managing stakeholders across IT and OT domainsm developing communication plans for technical and non-technical audiences and change management strategies for security implementations in OT<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3216 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-4-lab-2-traffic-analysis-with-zeek\" data-track-title=\"Workshop 2\" data-session-id=\"3298\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/4-lab-2-traffic-analysis-with-zeek\/\">Lab 2: Traffic Analysis with Zeek<\/a><\/h3><div class=\"tec-session-content\">Key Takeaways: Case 1 Presentation, extracting and analyzing HTTP, DNS, and SSH activity and identifying suspicious patterns in logs<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3298 --><\/td><\/tr><tr class=\"tec-time-1230 tec-global-session tec-global-session-custom lunch-and-networking\"><td class=\"tec-time\">12:30<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-lunch-and-networking-2\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"2067\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Lunch and networking<\/span><\/h3><\/div><!-- 2067 --><\/td><\/tr><tr class=\"tec-time-1330\"><td class=\"tec-time\">13:30<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-staying-on-course-in-a-volatile-environment-ot-security-in-complex-large-scale-hvdc-projects-a-real-life-example\" data-track-title=\"Main Track\" data-session-id=\"3145\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/staying-on-course-in-a-volatile-environment-ot-security-in-complex-large-scale-hvdc-projects-a-real-life-example\/\">Staying on course in a volatile environment: OT security in complex large-scale HVDC projects \u2013 a real-life example<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Learn how Amprion develops and adapts OT security requirements, integrates new regulations mid-project, and addresses the complexity of unmanned offshore stations. Real-world lessons and project management insights will be shared from the BorWin4\/DolWin4 and BalWin1\/BalWin2 initiatives.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tSimon Gustafson\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tInformation Security Manager, Amprion GmbH\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJan Grotel\u00fcschen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Consultant, GAI NetConsult GmbH\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3145 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-workshop-2-hands-on-implementation-lab\" data-track-title=\"Workshop 1\" data-session-id=\"3248\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-2-hands-on-implementation-lab\/\">Workshop 2: Hands-On Implementation Lab<\/a><\/h3><div class=\"tec-session-content\">Technical hands-on session for security practitioners. Key takeaways: Lab Environment Setup and Baseline Configuration<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3248 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-5-theory-advanced-ids-techniques\" data-track-title=\"Workshop 2\" data-session-id=\"3300\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/5-theory-advanced-ids-techniques\/\">Theory \u2013 Advanced IDS Techniques<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Customizing IDS rules, advanced rules: sticky buffers\/preprocessors and how they work, asset identification, optimizing rules and bypassing and evading IDS<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3300 --><\/td><\/tr><tr class=\"tec-time-1410 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">14:10<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-short-break-5\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1910\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short Break<\/span><\/h3><\/div><!-- 1910 --><\/td><\/tr><tr class=\"tec-time-1420\"><td class=\"tec-time\">14:20<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-youve-scored-it-now-what-data-needs-for-effective-remediation\" data-track-title=\"Main Track\" data-session-id=\"3159\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\">You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>This session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKylie McClanahan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCTO, Bastazo\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3159 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-2-3-protocol-specific-rule-implementation\" data-track-title=\"Workshop 1\" data-session-id=\"3270\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-3-protocol-specific-rule-implementation\/\">Protocol-Specific Rule Implementation<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Analyzing and configuring rules for common industrial protocols, implementing deep packet inspection for industrial protocols, configuring stateful inspection for TCP\/IP-based communications and creating exceptions for legacy systems and protocols<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3270 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-6-lab-3-threat-hunting-with-ids\" data-track-title=\"Workshop 2\" data-session-id=\"3304\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/6-lab-3-threat-hunting-with-ids\/\">Lab 3: Threat Hunting with IDS<\/a><\/h3><div class=\"tec-session-content\">Key Takeaways: Case 2 Presentation, simulating real-world attacks, investigating alerts and updating rules and correlating IDS logs with external threat intelligence<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3304 --><\/td><\/tr><tr class=\"tec-time-1500 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">15:00<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-refreshments-and-networking-4\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1998\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 1998 --><\/td><\/tr><tr class=\"tec-time-1525\"><td class=\"tec-time\">15:25<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-battling-cyber-threats-and-addressing-evolving-regulation-a-harmonized-strategy-for-safeguarding-battery-energy-storage-systems\" data-track-title=\"Main Track\" data-session-id=\"3169\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/battling-cyber-threats-and-addressing-evolving-regulation-a-harmonized-strategy-for-safeguarding-battery-energy-storage-systems\/\">Battling Cyber Threats and Addressing Evolving Regulation: A Harmonized Strategy for Safeguarding Battery Energy Storage Systems<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner\/Intermediate<\/em><\/p>This presentation will provide an overview of the complexity in cyberspace, the cybersecurity challenges faced by battery energy storage systems, and opportunities for solutions through cybersecurity, engineering and supply chain controls.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKatherine Hutton\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tProduct Manager, Cybersecurity, Fluence\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3169 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-2-4-testing-and-validation\" data-track-title=\"Workshop 1\" data-session-id=\"3272\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\">Testing and Validation<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tTony Turner\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVP of Product, Frenos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3272 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-7-theory-performance\" data-track-title=\"Workshop 2\" data-session-id=\"3306\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/7-theory-performance\/\">Theory \u2013 Performance<\/a><\/h3><div class=\"tec-session-content\">Key Takeaways: IDS general considerations and Dalton analysis<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3306 --><\/td><\/tr><tr class=\"tec-time-1605 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">16:05<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-short-break-6\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1915\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short Break<\/span><\/h3><\/div><!-- 1915 --><\/td><\/tr><tr class=\"tec-time-1615\"><td class=\"tec-time\">16:15<\/td><td colspan=\"2\" class=\"tec-track-main tec-track-track-1 tec-session-type-session tec-session-ot-systems-migration-virtualisation-and-re-engineering-under-enemy-fire\" data-track-title=\"Main Track, Workshop 1\" data-session-id=\"3171\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/ot-systems-migration-virtualisation-and-re-engineering-under-enemy-fire\/\">OT systems migration, virtualisation and re-engineering under enemy fire<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>At the beginning of the Russian invasion in Ukraine, many critical systems that were expected to be priority targets have been moved\u2026 elsewhere. This session will analyse experience of migrating critical systems away ASAP under fire, based on experience in Ukrainian power grid, telcos, defence \u2013 ranging from simple lift-and-shift to massive re-engineering. More importantly, we will look at how these systems in their new states evolved over last 2-3 years, which important challenges had to be addressed and what to prepare for in critical situations like Ukrainian CNI operators had to face.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tEugene Pilyankevich\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCTO, Cossack Labs\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3171 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-8-wrap-up-qa\" data-track-title=\"Workshop 2\" data-session-id=\"3308\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/8-wrap-up-qa\/\">Wrap-up &#038; Q&#038;A<\/a><\/h3><div class=\"tec-session-content\">Recap of key takeaways, next steps: fine-tuning IDS, integrating with SIEM and resources for further learning<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tK. Reid Wightman\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tVulnerability Researcher, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tOscar Delgado\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior Industrial Consultant, Dragos\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3308 --><\/td><\/tr><tr class=\"tec-time-1655 tec-global-session tec-global-session-session the-chairman-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\"><td class=\"tec-time\">16:55<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-the-chairman-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes-2\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3173\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/the-chairman-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes-2\/\">The chairman provides a summary of the day&#8217;s agenda and key learning outcomes<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3173 --><\/td><\/tr><tr class=\"tec-time-1710 tec-global-session tec-global-session-session walk-talk\"><td class=\"tec-time\">17:10<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-walk-talk\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3177\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\">Walk &#038; Talk<\/a><\/h3><div class=\"tec-session-content\">Choose between various security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers. 1) OT Firmware Security: The Attack Isn\u2019t Coming, It\u2019s Already Installed. 2) OT Assessment &amp; Penetration Testing in a Live Environment. 3) Navigating the new normal in cybersecurity. 4) Log collection in OT \u2013 And why it\u2019s the core activity for your defence of OT\/ICS. Click here for more information.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tPatrick C. Miller\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOwner, Ampyx Cyber\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tS\u00f8ren Egede Knudsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCEO & IT\/OT Security Expert, Egede\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMarc Br\u00e6ndstrup\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tHead of Siemens Industrial Security in Denmark, Siemens\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMichael L. Weng\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSOC Analyst, SektorCERT\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3177 --><\/td><\/tr><tr class=\"tec-time-1810 tec-global-session tec-global-session-custom networking-reception\"><td class=\"tec-time\">18:10<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-networking-reception-2\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3179\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Networking reception<\/span><\/h3><div class=\"tec-session-content\">A networking reception with refreshments, offering the opportunity to connect with our partners.<\/div><\/div><!-- 3179 --><\/td><\/tr><tr class=\"tec-time-1840 tec-global-session tec-global-session-custom dinner-networking-requires-separate-signup\"><td class=\"tec-time\">18:40<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-dinner-networking-requires-separate-signup\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1978\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Dinner &#038; networking (Requires separate signup)<\/span><\/h3><div class=\"tec-session-content\">Buffet-style 3-course dinner designed to foster networking, inclusive of three beverages and coffee.<\/div><\/div><!-- 1978 --><\/td><\/tr><\/tbody><\/table><\/div><\/div><div data-size=\"auto\" class=\"tab-pane fade  \" id=\"ut_tab_69e73973ec142\"> <div class=\"tec-schedule-wrapper \"><table class=\"tec-schedule tec-color-scheme-light tec-layout-table\" border=\"0\"><thead><tr><th class=\"tec-col-time\">Time<\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Main Track<\/span> <span class=\"tec-track-description\"><\/span> <\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Workshop 1<\/span> <span class=\"tec-track-description\"><\/span> <\/th><th class=\"tec-col-track\"> <span class=\"tec-track-name\">Workshop 2<\/span> <span class=\"tec-track-description\"><\/span> <\/th><\/tr><\/thead><tbody><tr class=\"tec-time-800 tec-global-session tec-global-session-custom welcome-to-day-3-at-isc-cph\"><td class=\"tec-time\">8:00<\/td><td colspan=\"3\" class=\"tec-track-danish tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-welcome-to-day-3-at-isc-cph\" data-track-title=\"Danish Track, Main Track, Workshop 1, Workshop 2\" data-session-id=\"1980\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Welcome to Day 3 at ISC-CPH<\/span><\/h3><div class=\"tec-session-content\">Enjoy a light breakfast buffet, coffee, tea and network with your security colleagues.<\/div><\/div><!-- 1980 --><\/td><\/tr><tr class=\"tec-time-900 tec-global-session tec-global-session-session chairman-james-r-mcquiggan-introduces-todays-program\"><td class=\"tec-time\">9:00<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-chairman-james-mcquiggan-introduces-todays-program\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3184\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/chairman-james-mcquiggan-introduces-todays-program\/\">Chairman James R. McQuiggan introduces today\u2019s program<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3184 --><\/td><\/tr><tr class=\"tec-time-910\"><td class=\"tec-time\">9:10<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-hazard-analysis-a-critical-systems-study-on-passenger-ropeways\" data-track-title=\"Main Track\" data-session-id=\"3068\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/hazard-analysis-a-critical-systems-study-on-passenger-ropeways\/\">Hazard Analysis: A Critical Systems Study on Passenger Ropeways<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>Explore the safety implications of modernizing automation in chairlift systems through a case study of passenger ropeways. Topics include system interdependencies, AI\/ML impacts, IT data flows, lifecycle and supply chain considerations. Discussion will also include the effects of energy efficiency and carbon reduction efforts on safety systems. Learn practical strategies for integrating modern tech while maintaining regulatory compliance and operational safety.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tSean R. Bouchard\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCEO, XenonCyber Dynamics\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3068 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-part-1-based-on-network-visibility-what-can-we-learn-about-activity-of-interest\" data-track-title=\"Workshop 1\" data-session-id=\"3208\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-based-on-network-visibility-what-can-we-learn-about-activity-of-interest\/\">Workshop 1: Based on network visibility, what can we learn about activity of interest<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>In the first part of this workshop, we will walk through investigative examples then explain the background behind network objects allowing for their further investigation <\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJoe Slowik\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tDirector, Cybersecurity Alerting Strategy, Dataminr\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3208 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-1\" data-track-title=\"Workshop 2\" data-session-id=\"3223\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1\/\">Workshop 1: Secure Communication with OPC UA<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>This hands-on workshop offers a deep dive into OPC UA and its role in enabling secure communication in industrial environments. Participants will learn how to configure OPC UA for secure data exchange and experience the difference firsthand through practical exercises.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKenneth B. J\u00f8rgensen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOwner, KCERT\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJesper Kristiansen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tTechnology Specialist, Siemens\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3223 --><\/td><\/tr><tr class=\"tec-time-950 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">9:50<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-short-break-7\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3035\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short Break<\/span><\/h3><\/div><!-- 3035 --><\/td><\/tr><tr class=\"tec-time-1000\"><td class=\"tec-time\">10:00<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-lessons-learned-from-ot-incident-response\" data-track-title=\"Main Track\" data-session-id=\"3189\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/lessons-learned-from-ot-incident-response\/\">Lessons learned from OT incident response<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner\/Intermediate<\/em><\/p>In this talk, we will cover the similarities between IT and OT incident response, the unique considerations for IR in OT environments, and proactive steps that you or your teams can do to prepare for an OT incident.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMarie Moe\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tPrincipal Consultant, Mandiant, Google Cloud\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3189 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-part-2-based-on-network-visibility-what-can-we-learn-about-activity-of-interest\" data-track-title=\"Workshop 1\" data-session-id=\"3211\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-2-based-on-network-visibility-what-can-we-learn-about-activity-of-interest\/\">Based on network visibility, what can we learn about activity of interest<\/a><\/h3><div class=\"tec-session-content\">In the second part of the workshop, we will dig into more complicated examples and highlight various resources that can be used to enrich and analyze network objects. <\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJoe Slowik\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tDirector, Cybersecurity Alerting Strategy, Dataminr\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3211 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-2\" data-track-title=\"Workshop 2\" data-session-id=\"3228\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-2\/\">Secure Communication with OPC UA<\/a><\/h3><div class=\"tec-session-content\">Key Takeaways: Hands-on, encrypted OPC-UA visibility and Round up. Part 2 of the workshop: Secure Communication with OPC UA.  <\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKenneth B. J\u00f8rgensen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOwner, KCERT\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJesper Kristiansen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tTechnology Specialist, Siemens\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3228 --><\/td><\/tr><tr class=\"tec-time-1040 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">10:40<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-refreshments-and-networking-5\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3053\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 3053 --><\/td><\/tr><tr class=\"tec-time-1110\"><td class=\"tec-time\">11:10<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-breaking-without-bricking-safe-vulnerability-research-in-ot-environments\" data-track-title=\"Main Track\" data-session-id=\"3191\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/breaking-without-bricking-safe-vulnerability-research-in-ot-environments\/\">Breaking Without Bricking: Safe Vulnerability Research in OT Environments<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Beginner\/Intermediate<\/em><\/p>You will gain a new insight combined with a practical demonstration of why some previous restraints may be overcome by using this approach.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMikael Vingaard\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior OT Security Consultant, ICSRange\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJens Nielsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tSenior OT Security Researcher, ICSRange\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3191 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-1-understanding-ot-networks\" data-track-title=\"Workshop 1\" data-session-id=\"3215\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/1-understanding-ot-networks\/\">Workshop 2: Understanding OT Networks &#038; Unfold the OT Network Jungle<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>This training focuses on the dynamic nature of OT networks and how to improve visibility using practical, open-source tools. Participants will learn how to identify devices, map data flows, and spot blind spots in OT environments.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMartin Scheu\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Security Engineer, Switch\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMischa Diehm\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tNetwork Engineer, narrowin\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3215 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-1-2\" data-track-title=\"Workshop 2\" data-session-id=\"3233\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-1-2\/\">Workshop 2: Hardening for ICS \u2013 How to reduce attack vectors<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>This workshop on Hardening will give insights on the various aspects of a hardening process, the ins and outs of hardening will be explained, how to perform hardening, why the concerned hardening settings are important and what to strengthen to reduce potential attack vectors.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tDieter Sarrazyn\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tIndustrial Security Advisor, Secudea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3233 --><\/td><\/tr><tr class=\"tec-time-1150 tec-global-session tec-global-session-custom lunch-and-networking\"><td class=\"tec-time\">11:50<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-lunch-and-networking-3\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"1901\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Lunch and networking<\/span><\/h3><\/div><!-- 1901 --><\/td><\/tr><tr class=\"tec-time-1250\"><td class=\"tec-time\">12:50<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-impowering-women-in-cybersecurity\" data-track-title=\"Main Track\" data-session-id=\"3194\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/impowering-women-in-cybersecurity\/\">Impowering women in cybersecurity<\/a><\/h3><div class=\"tec-session-content\">Saltanat Mashirova will lead a panel this year with focus on Impowering women in cybersecurity<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tAnette Svendsen\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCompliance Manager, Secomea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKatherine Hutton\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tProduct Manager, Cybersecurity, Fluence\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMarie Moe\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tPrincipal Consultant, Mandiant, Google Cloud\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tKylie McClanahan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCTO, Bastazo\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tSaltanat Mashirova\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Cybersecurity Lead, CPX\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3194 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-2-ot-network-security-monitoring\" data-track-title=\"Workshop 1\" data-session-id=\"3218\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-ot-network-security-monitoring\/\">OT Network Security Monitoring<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: Risk based approach to choosing monitoring points, collect and forward traffic, Inter-zone visibility, IT\/OT bridge, edge device discovery, outside view, OT Network Security Monitoring and its limits and testing and validating. second part of the workshop: Understanding OT Networks &amp; Unfold the OT Network Jungle <\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMartin Scheu\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Security Engineer, Switch\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMischa Diehm\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tNetwork Engineer, narrowin\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3218 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-2-2\" data-track-title=\"Workshop 2\" data-session-id=\"3235\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-2-2\/\">Hardening for ICS \u2013 how to reduce attack vectors<\/a><\/h3><div class=\"tec-session-content\">Part 2. Key takeaways: Hardening step by step \u2013 starting from backup to a basic hardened system and Lab \u2013 Hardening preparation &amp; basic hardening\r\n<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tDieter Sarrazyn\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tIndustrial Security Advisor, Secudea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3235 --><\/td><\/tr><tr class=\"tec-time-1330 tec-global-session tec-global-session-custom refreshments-and-networking\"><td class=\"tec-time\">13:30<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-refreshments-and-networking-6\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3055\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Refreshments and networking<\/span><\/h3><\/div><!-- 3055 --><\/td><\/tr><tr class=\"tec-time-1355\"><td class=\"tec-time\">13:55<\/td><td colspan=\"1\" class=\"tec-track-main tec-session-type-session tec-session-detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\" data-track-title=\"Main Track\" data-session-id=\"3196\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\">Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate \/ Advanced<\/em><\/p>Attendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.\r\n<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tNicklas Keijser\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT lead - Detection Services, Truesec\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3196 --><\/td><td colspan=\"1\" class=\"tec-track-track-1 tec-session-type-session tec-session-3-getting-started-with-ot-network-security-monitoring\" data-track-title=\"Workshop 1\" data-session-id=\"3221\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/3-getting-started-with-ot-network-security-monitoring\/\">Getting started with OT Network Security Monitoring<\/a><\/h3><div class=\"tec-session-content\">Key takeaways: The cycle: use case definition, detection, alerting, playbook creation, tuning, techniques to discover assets and communication patterns and testing and validating. third part of the workshop: Understanding OT Networks &amp; Unfold the OT Network Jungle<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMartin Scheu\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tOT Security Engineer, Switch\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tMischa Diehm\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tNetwork Engineer, narrowin\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3221 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-3\" data-track-title=\"Workshop 2\" data-session-id=\"3237\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-3\/\">Hardening for ICS \u2013 how to reduce attack vectors<\/a><\/h3><div class=\"tec-session-content\">Part 3. Key takeaways: Hardening step by step \u2013 securing the network side and Lab \u2013 implementing hardening settings on the network side<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tDieter Sarrazyn\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tIndustrial Security Advisor, Secudea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3237 --><\/td><\/tr><tr class=\"tec-time-1430 tec-global-session tec-global-session-custom short-break\"><td class=\"tec-time\">14:30<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-short-break-8\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3037\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">Short Break<\/span><\/h3><\/div><!-- 3037 --><\/td><\/tr><tr class=\"tec-time-1435\"><td class=\"tec-time\">14:35<\/td><td colspan=\"2\" class=\"tec-track-main tec-track-track-1 tec-session-type-session tec-session-unsolicited-advice-on-ot-pentesting\" data-track-title=\"Main Track, Workshop 1\" data-session-id=\"3198\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/unsolicited-advice-on-ot-pentesting\/\">Unsolicited Advice on OT Pentesting<\/a><\/h3><div class=\"tec-session-content\"><p><em>Technical Level: Intermediate<\/em><\/p>OT penetration test feels like a buzzword. Many people talk about it, but only a few know what it should cover. And this is not an accident. The traditional IT penetration test does not translate directly to OT because of the risks it involves, which can be accepted in IT but can be catastrophic in OT. I spent a lot of time researching this question during my 9 years as a penetration tester at Siemens, and as a threat intel and malware researcher at Fortinet.\r\n\r\nIn this presentation I would like to share my approach on how penetration testing can be translated to OT. My goal was to deliver the same value but decrease the risk it involves. I recommend a set of different security assessments on different layers that allow us to have control over the risks but deliver similar or even better results than a penetration test. Learnings for delegates:\r\n\r\n- The reason IT pretests cannot be done in OT.\r\n\r\n- Challenges of OT pentests.\r\n\r\n- An alternative strategy to get the same value with less risk.\r\n\r\n- Tips and Tricks around OT pentest.<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tGeri R\u00e9vay\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tPrincipal Security Researcher, Fortinet\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3198 --><\/td><td colspan=\"1\" class=\"tec-track-track-2 tec-session-type-session tec-session-part-4\" data-track-title=\"Workshop 2\" data-session-id=\"3240\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/part-4\/\">Hardening for ICS \u2013 how to reduce attack vectors<\/a><\/h3><div class=\"tec-session-content\">Part 4. Key takeaways: Hardening step by step \u2013 Further securing the users and the system \u2026 playing with (group) policies and Lab \u2013 implementing further hardening settings using policies<\/div> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tDieter Sarrazyn\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tIndustrial Security Advisor, Secudea\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3240 --><\/td><\/tr><tr class=\"tec-time-1515 tec-global-session tec-global-session-session end-of-the-capture-the-flag-competition\"><td class=\"tec-time\">15:15<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-end-of-the-capture-the-flag-competition\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3594\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/end-of-the-capture-the-flag-competition\/\">End of the Capture-the-flag competition<\/a><\/h3><div class=\"tec-session-content\">A short overview and status and award ceremony to the top 3 teams.<\/div><\/div><!-- 3594 --><\/td><\/tr><tr class=\"tec-time-1530 tec-global-session tec-global-session-session chairman-james-r-mcquiggan-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\"><td class=\"tec-time\">15:30<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-session tec-session-chairman-james-mcquiggan-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3201\"><div class=\"tec-session-cell-content\"><h3><a class=\"tec-session-title\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/chairman-james-mcquiggan-provides-a-summary-of-the-days-agenda-and-key-learning-outcomes\/\">Chairman James R. McQuiggan provides a summary of the day&#8217;s agenda and key learning outcomes<\/a><\/h3> <div class=\"tec-session-speakers\">\t\t\t\t<div class=\"tec-session-speaker\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-name\">\n\t\t\t\t\t\t\tJames R. McQuiggan\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"tec-session-speaker-title-organization\">\n\t\t\t\t\t\t\tCISO Advisor, KnowBe4\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><!-- 3201 --><\/td><\/tr><tr class=\"tec-time-1540 tec-global-session tec-global-session-custom the-conference-ends--see-you-next-year\"><td class=\"tec-time\">15:40<\/td><td colspan=\"3\" class=\"tec-track-main tec-track-track-1 tec-track-track-2 tec-session-type-custom tec-session-the-conference-ends-see-you-next-year\" data-track-title=\"Main Track, Workshop 1, Workshop 2\" data-session-id=\"3205\"><div class=\"tec-session-cell-content\"><h3><span class=\"tec-session-title\">The conference ends \u2013 See you next year!<\/span><\/h3><\/div><!-- 3205 --><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<style type=\"text\/css\">#bklyn_btn_69e73973f2c9f .bklyn-btn { color:#ffffff !important; background-color:#111111 !important; }#bklyn_btn_69e73973f2c9f .bklyn-btn:hover{ color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2c9f .bklyn-btn:focus{ color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2c9f .bklyn-btn:active { color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2c9f a { letter-spacing:0.07em; }<\/style><div id=\"bklyn_btn_69e73973f2c9f\" class=\"bklyn-btn-holder  bklyn-btn-center\"><a title=\"\"   href=\"https:\/\/publuu.com\/flip-book\/865023\/1971940\" target=\"_blank\" class=\"bklyn-btn  bklyn-btn-large\" ><span class=\"ut-btn-text\">DOWNLOAD PROGRAM<\/span><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<style type=\"text\/css\">#bklyn_btn_69e73973f2cea .bklyn-btn { color:#ffffff !important; background-color:#111111 !important; }#bklyn_btn_69e73973f2cea .bklyn-btn:hover{ color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2cea .bklyn-btn:focus{ color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2cea .bklyn-btn:active { color:#ffffff !important; background-color:#fd7014 !important; }#bklyn_btn_69e73973f2cea a { letter-spacing:0.07em; }<\/style><div id=\"bklyn_btn_69e73973f2cea\" class=\"bklyn-btn-holder  bklyn-btn-center\"><a title=\"\"   href=\"https:\/\/insightevents.dk\/isc-cph\/registration\/#register\" target=\"_blank\" class=\"bklyn-btn  bklyn-btn-large\" ><span class=\"ut-btn-text\">SIGN UP FOR ISC-CPH<\/span><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1718189054638{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column]<div class=\"wpb_content_element\"><style type=\"text\/css\">#ut_tabs_style_69e73973f2d53 .bkly-icon-tab-label {font-size: 18px; }#ut_tabs_style_69e73973f2d53 .bkly-icon-tab-label {font-weight: bold; }#ut_tab_style_69e73973f2d42 a .bkly-icon-tab-label {color: #30135e; }#ut_tab_style_69e73973f2d42 a:hover .bkly-icon-tab-label {color: #f9922d; }#ut_tab_style_69e73973f2d42.active a .bkly-icon-tab-label {color: #f9922d; }#ut_tab_style_69e73973f2d4e a .bkly-icon-tab-label {color: #30135e; }#ut_tab_style_69e73973f2d4e a:hover .bkly-icon-tab-label {color: #f9922d; }#ut_tab_style_69e73973f2d4e.active a .bkly-icon-tab-label {color: #f9922d; }<\/style><div id=\"ut_tabs_style_69e73973f2d53\" class=\"bklyn-icon-tabs-wrap bklyn-icon-tabs-center\"><ul class=\"bklyn-icon-tabs nav nav-tabs\"><li id=\"ut_tab_style_69e73973f2d42\" class=\"active\"><a href=\"#ut_tab_69e73973f2d40\" data-toggle=\"tab\"><span class=\"bkly-icon-tab \"><\/span><span class=\"bkly-icon-tab-label \">FULL program \u2013 including one day in Danish<br \/>\n13-14-15 Nov 2023<\/span><\/a><\/li><li id=\"ut_tab_style_69e73973f2d4e\" ><a href=\"#ut_tab_69e73973f2d4d\" data-toggle=\"tab\"><span class=\"bkly-icon-tab \"><\/span><span class=\"bkly-icon-tab-label \">INTERNATIONAL program<br \/>\n14-15 Nov 2023<\/span><\/a><\/li><\/ul><div class=\"tab-content\"><div data-size=\"auto\" class=\"tab-pane fade  active\" id=\"ut_tab_69e73973f2d40\"> <iframe style=\"border: none; width: 100%; height: 600px;\" src=\"\/\/e.issuu.com\/embed.html?d=23isc-cph_program-a4-alle_dage-final&amp;hideIssuuLogo=true&amp;hideShareButton=true&amp;u=insightevents\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div><div data-size=\"auto\" class=\"tab-pane fade  \" id=\"ut_tab_69e73973f2d4d\"> <iframe style=\"border: none; width: 100%; height: 600px;\" src=\"\/\/e.issuu.com\/embed.html?d=23isc-cph_program-a4-international-final&amp;hideIssuuLogo=true&amp;hideShareButton=true&amp;u=insightevents\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1694784315285{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][vc_raw_html]JTNDaWZyYW1lJTIwc3R5bGUlM0QlMjJib3JkZXIlM0ElMjBub25lJTNCJTIwd2lkdGglM0ElMjAxMDAlMjUlM0IlMjBoZWlnaHQlM0ElMjA2MDBweCUzQiUyMiUyMHNyYyUzRCUyMiUyRiUyRmUuaXNzdXUuY29tJTJGZW1iZWQuaHRtbCUzRmQlM0QyM2lzYy1jcGhfcHJvZ3JhbS1hNC1hbGxlX2RhZ2UtZmluYWwlMjZhbXAlM0JoaWRlSXNzdXVMb2dvJTNEdHJ1ZSUyNmFtcCUzQmhpZGVTaGFyZUJ1dHRvbiUzRHRydWUlMjZhbXAlM0J1JTNEaW5zaWdodGV2ZW50cyUyMiUyMGFsbG93ZnVsbHNjcmVlbiUzRCUyMmFsbG93ZnVsbHNjcmVlbiUyMiUzRSUzQyUyRmlmcmFtZSUzRSUwQQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1694784315285{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1686144266324{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h1>Industrial Security Conference Copenhagen<\/h1>\n<p><strong>For more information about Industrial Security Conference Copenhagen 2023<\/strong><\/p>\n<p>Contact us on <a href=\"mailto:info@insightevents.dk?subject=Industrial Security Conference CPH 2023\">info@insightevents.dk<\/a> or +45 35 25 35 45[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1686143736396{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row][vc_column][vc_empty_space height=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1718189054638{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1694784315285{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][vc_raw_html]JTNDaWZyYW1lJTIwc3R5bGUlM0QlMjJib3JkZXIlM0ElMjBub25lJTNCJTIwd2lkdGglM0ElMjAxMDAlMjUlM0IlMjBoZWlnaHQlM0ElMjA2MDBweCUzQiUyMiUyMHNyYyUzRCUyMiUyRiUyRmUuaXNzdXUuY29tJTJGZW1iZWQuaHRtbCUzRmQlM0QyM2lzYy1jcGhfcHJvZ3JhbS1hNC1hbGxlX2RhZ2UtZmluYWwlMjZhbXAlM0JoaWRlSXNzdXVMb2dvJTNEdHJ1ZSUyNmFtcCUzQmhpZGVTaGFyZUJ1dHRvbiUzRHRydWUlMjZhbXAlM0J1JTNEaW5zaWdodGV2ZW50cyUyMiUyMGFsbG93ZnVsbHNjcmVlbiUzRCUyMmFsbG93ZnVsbHNjcmVlbiUyMiUzRSUzQyUyRmlmcmFtZSUzRSUwQQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1694784315285{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1686144266324{margin-top: 20px !important;margin-bottom: 0px !important;}&#8221;][vc_column][vc_column_text] Industrial Security Conference Copenhagen For more information about Industrial Security Conference Copenhagen 2023 Contact us on info@insightevents.dk or +45 35 25 35 45[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1686143736396{margin-top: 20px [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1043,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial Security Conference Copenhagen \u2013 Insight IT<\/title>\n<meta name=\"description\" content=\"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Security Conference Copenhagen \u2013 Insight IT\" \/>\n<meta property=\"og:description\" content=\"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T11:10:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/program\/\",\"name\":\"Industrial Security Conference Copenhagen \u2013 Insight IT\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg\",\"datePublished\":\"2021-09-01T15:43:58+00:00\",\"dateModified\":\"2025-06-11T11:10:12+00:00\",\"description\":\"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/program\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg\",\"contentUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Join Industrial Security Conference Copenhagen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program: Industrial Security Conference Copenhagen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Security Conference Copenhagen \u2013 Insight IT","description":"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/program\/","og_locale":"en_GB","og_type":"article","og_title":"Industrial Security Conference Copenhagen \u2013 Insight IT","og_description":"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.","og_url":"https:\/\/insightevents.dk\/isc-cph\/program\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-11T11:10:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/program\/","url":"https:\/\/insightevents.dk\/isc-cph\/program\/","name":"Industrial Security Conference Copenhagen \u2013 Insight IT","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage"},"image":{"@id":"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage"},"thumbnailUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg","datePublished":"2021-09-01T15:43:58+00:00","dateModified":"2025-06-11T11:10:12+00:00","description":"Join the international Industrial Security Conference in CPH. Over the course of 3 days, you will be updated on the current threat landscape. See program.","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/program\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/program\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/program\/#primaryimage","url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg","contentUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2023\/01\/23isc_Linkedinbanner_1200x630px.jpg","width":1200,"height":630,"caption":"Join Industrial Security Conference Copenhagen"},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Program: Industrial Security Conference Copenhagen"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages\/181"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/pages\/181\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media\/1043"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}